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"], 0x20) socket$unix(0x1, 0x2, 0x0) dup2(0xffffffffffffffff, r0) 03:15:07 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:07 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) accept4(r1, 0x0, 0x0, 0x0) 03:15:07 executing program 4: 03:15:07 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x200000b, 0x11, r2, 0x0) r3 = socket(0x0, 0x0, 0x8) sendmsg$key(r3, 0x0, 0x0) r4 = syz_open_dev$sg(0x0, 0x0, 0x40) writev(r4, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d9", 0x20}], 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:15:07 executing program 4: 03:15:07 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000d80)=ANY=[@ANYBLOB="000200000000005afc8500040100c910ff01000d00000000b379f26337296b0b000000622db173ca9a177af8b0b259e5dbee0049a0adfe19c54984d30c0198d3ca990e8712a7ac3658c1007e6b9036229e10f6920a9b712486c396ed7d8938d6466ec47918429b1b829e69bd2c3ff32ffa79fbdb43eed3d1ffc2b373eccead9bb707915332e9e27b2e11715c0aa2af29a85b2537829b0a1201008719d47e6902f4c881c43c0cef5679a939bbb019dccadf8d55a65867a9c0aec1bbc801ebce2ee8321d9c204c8ef2bffeb15ae02118c843c9d718cee62d28abb06635ea950ad3bc857f32f45e65d5455fa8e3ded77ed04a92b629e1d2f18468f9e5375a0ee3ac0d74c0482025de8c7a85ee52f883beea0b005b6f8a7dfe9be9f2d50b162bb3b54cda00cfbf434790b34a40e2c56f096016410f00497c1b9064c662243bfa8265415c4170c5218f5c0de2250034338f67d029f3ed22c80e29ef6885bac8fd15cdc113a9f22c57ba08a68ff18d321b0a80e7b1fe8c39654d685eaac945510b1ddbd96591defddbda84b37e5d6339116ae043bdbf9aef9e1a2592eb510763339e8813c0680475e2e388b4d1913c1c7aab86569c8ff05787bc8a9de03a5f003c3275537bd95267730773b8085dd87a108d10337f0e31d8cd939ddf72aa2734638bc53331d26b11e0acd28b49a89af2f7f58d99260177ff6bba2dc1a86a9995fd6bba6120a24effe10f6bcf5ccbeec5d46c811352f9f8787e642e7d8cb93d5fadb16cadcf35db3a351402c314f4face68bad50000f9d2128461937f8af7392fa21902737207ec1fe1bfb748e55531f681704fcedfd0beab3f84f317eb92e9a8c79bb403aa9bb4f9602b60de123dc5c8ddfc923807b84be9336a6312ebc79f4722e1e9eb81de61f3663a0c344e4da3984bce1ca5bc145cbfebf1f9fa738e9daf9a2e0760777e9d799aabce946200000000006f5b2f414e54921d6a8c6162709863390139b56428dd67570d1ea6f39d92226fa0ee939b6daf8d330c82896511d0bbbc5f62b8ed576346da94c5c123a4ec4bc88f00df3558d16d50a2484180c67066f5d98558ea2caf4164bdb531a4a9aca6a34497c3"], 0x20) socket$unix(0x1, 0x2, 0x0) dup2(0xffffffffffffffff, r0) 03:15:07 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x200000b, 0x11, r2, 0x0) r3 = socket(0x0, 0x0, 0x8) sendmsg$key(r3, 0x0, 0x0) r4 = syz_open_dev$sg(0x0, 0x0, 0x40) writev(r4, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90c", 0x21}], 0x1) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:15:07 executing program 3: socket$inet6(0xa, 0x3, 0x6b) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) accept4(r0, 0x0, 0x0, 0x0) 03:15:07 executing program 4: 03:15:07 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) [ 1402.893452][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1402.899399][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:15:07 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_team\x00', 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) socket$inet6(0xa, 0x3, 0x6b) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 03:15:07 executing program 3: socket$inet6(0xa, 0x3, 0x6b) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) accept4(r0, 0x0, 0x0, 0x0) 03:15:07 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000d80)=ANY=[@ANYBLOB="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"], 0x20) r3 = socket$unix(0x1, 0x2, 0x0) dup2(r3, 0xffffffffffffffff) 03:15:07 executing program 4: 03:15:07 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x200000b, 0x11, r2, 0x0) r3 = socket(0x0, 0x0, 0x8) sendmsg$key(r3, 0x0, 0x0) r4 = syz_open_dev$sg(0x0, 0x0, 0x40) writev(r4, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90c", 0x21}], 0x1) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:15:07 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:08 executing program 4: 03:15:08 executing program 3: socket$inet6(0xa, 0x3, 0x6b) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) accept4(r0, 0x0, 0x0, 0x0) 03:15:08 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:08 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000d80)=ANY=[@ANYBLOB="000200000000005afc8500040100c910ff01000d00000000b379f26337296b0b000000622db173ca9a177af8b0b259e5dbee0049a0adfe19c54984d30c0198d3ca990e8712a7ac3658c1007e6b9036229e10f6920a9b712486c396ed7d8938d6466ec47918429b1b829e69bd2c3ff32ffa79fbdb43eed3d1ffc2b373eccead9bb707915332e9e27b2e11715c0aa2af29a85b2537829b0a1201008719d47e6902f4c881c43c0cef5679a939bbb019dccadf8d55a65867a9c0aec1bbc801ebce2ee8321d9c204c8ef2bffeb15ae02118c843c9d718cee62d28abb06635ea950ad3bc857f32f45e65d5455fa8e3ded77ed04a92b629e1d2f18468f9e5375a0ee3ac0d74c0482025de8c7a85ee52f883beea0b005b6f8a7dfe9be9f2d50b162bb3b54cda00cfbf434790b34a40e2c56f096016410f00497c1b9064c662243bfa8265415c4170c5218f5c0de2250034338f67d029f3ed22c80e29ef6885bac8fd15cdc113a9f22c57ba08a68ff18d321b0a80e7b1fe8c39654d685eaac945510b1ddbd96591defddbda84b37e5d6339116ae043bdbf9aef9e1a2592eb510763339e8813c0680475e2e388b4d1913c1c7aab86569c8ff05787bc8a9de03a5f003c3275537bd95267730773b8085dd87a108d10337f0e31d8cd939ddf72aa2734638bc53331d26b11e0acd28b49a89af2f7f58d99260177ff6bba2dc1a86a9995fd6bba6120a24effe10f6bcf5ccbeec5d46c811352f9f8787e642e7d8cb93d5fadb16cadcf35db3a351402c314f4face68bad50000f9d2128461937f8af7392fa21902737207ec1fe1bfb748e55531f681704fcedfd0beab3f84f317eb92e9a8c79bb403aa9bb4f9602b60de123dc5c8ddfc923807b84be9336a6312ebc79f4722e1e9eb81de61f3663a0c344e4da3984bce1ca5bc145cbfebf1f9fa738e9daf9a2e0760777e9d799aabce946200000000006f5b2f414e54921d6a8c6162709863390139b56428dd67570d1ea6f39d92226fa0ee939b6daf8d330c82896511d0bbbc5f62b8ed576346da94c5c123a4ec4bc88f00df3558d16d50a2484180c67066f5d98558ea2caf4164bdb531a4a9aca6a34497c3"], 0x20) r3 = socket$unix(0x1, 0x2, 0x0) dup2(r3, 0xffffffffffffffff) 03:15:08 executing program 4: 03:15:08 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x200000b, 0x11, r2, 0x0) r3 = socket(0x0, 0x0, 0x8) sendmsg$key(r3, 0x0, 0x0) r4 = syz_open_dev$sg(0x0, 0x0, 0x40) writev(r4, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90c", 0x21}], 0x1) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:15:08 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_team\x00', 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) r3 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r3, 0x0, &(0x7f0000000000)="0815b5055e0bcfe87b3071") splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 03:15:08 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000d80)=ANY=[@ANYBLOB="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"], 0x20) r3 = socket$unix(0x1, 0x2, 0x0) dup2(r3, 0xffffffffffffffff) 03:15:08 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x0, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) accept4(r1, 0x0, 0x0, 0x0) 03:15:08 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:08 executing program 4: 03:15:08 executing program 5: 03:15:08 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:08 executing program 4: 03:15:08 executing program 5: 03:15:08 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x0, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) accept4(r1, 0x0, 0x0, 0x0) 03:15:08 executing program 0: 03:15:09 executing program 4: 03:15:09 executing program 5: 03:15:09 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:09 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x0, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) accept4(r1, 0x0, 0x0, 0x0) 03:15:09 executing program 0: 03:15:09 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_team\x00', 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) r3 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r3, 0x0, &(0x7f0000000000)="0815b5055e0bcfe87b3071") splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 03:15:09 executing program 4: 03:15:09 executing program 0: 03:15:09 executing program 5: 03:15:09 executing program 4: 03:15:09 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) accept4(r1, 0x0, 0x0, 0x0) 03:15:09 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:09 executing program 5: 03:15:09 executing program 4: 03:15:09 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) accept4(r1, 0x0, 0x0, 0x0) 03:15:09 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:10 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_team\x00', 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) r3 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r3, 0x0, &(0x7f0000000000)="0815b5055e0bcfe87b3071") splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 03:15:10 executing program 0: 03:15:10 executing program 5: 03:15:10 executing program 4: 03:15:10 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) accept4(r1, 0x0, 0x0, 0x0) 03:15:10 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:10 executing program 4: 03:15:10 executing program 5: 03:15:10 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) accept4(r1, 0x0, 0x0, 0x0) 03:15:10 executing program 0: 03:15:10 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:10 executing program 0: [ 1406.413413][ C0] net_ratelimit: 16 callbacks suppressed [ 1406.413419][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1406.424938][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:15:11 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_team\x00', 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) r3 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r3, 0x1000008912, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 03:15:11 executing program 4: 03:15:11 executing program 5: 03:15:11 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) accept4(r1, 0x0, 0x0, 0x0) 03:15:11 executing program 0: 03:15:11 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x0, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:11 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) accept4(r1, 0x0, 0x0, 0x0) 03:15:11 executing program 4: 03:15:11 executing program 5: 03:15:11 executing program 0: 03:15:11 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0b") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) accept4(r1, 0x0, 0x0, 0x0) [ 1407.053417][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1407.059300][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:15:11 executing program 0: [ 1407.373787][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1407.379587][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1407.623580][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1407.629369][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:15:12 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_team\x00', 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) r3 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r3, 0x1000008912, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 03:15:12 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x0, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:12 executing program 5: 03:15:12 executing program 4: 03:15:12 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0b") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) accept4(r1, 0x0, 0x0, 0x0) 03:15:12 executing program 0: 03:15:12 executing program 0: 03:15:12 executing program 5: 03:15:12 executing program 4: 03:15:12 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0b") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) accept4(r1, 0x0, 0x0, 0x0) 03:15:12 executing program 0: 03:15:12 executing program 4: [ 1408.173556][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1408.179942][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:15:13 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_team\x00', 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) r3 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r3, 0x1000008912, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 03:15:13 executing program 5: 03:15:13 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x0, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:13 executing program 4: 03:15:13 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) accept4(r1, 0x0, 0x0, 0x0) 03:15:13 executing program 0: 03:15:13 executing program 0: 03:15:13 executing program 5: 03:15:13 executing program 4: 03:15:13 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) accept4(r1, 0x0, 0x0, 0x0) 03:15:13 executing program 0: 03:15:13 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:14 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_team\x00', 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) r3 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r3, 0x1000008912, &(0x7f0000000000)) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 03:15:14 executing program 5: 03:15:14 executing program 4: 03:15:14 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) accept4(r1, 0x0, 0x0, 0x0) 03:15:14 executing program 0: 03:15:14 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:14 executing program 0: 03:15:14 executing program 4: 03:15:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg$inet(r3, &(0x7f0000002640)=[{{&(0x7f0000000200)={0x2, 0x4e23, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000600)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @loopback, @loopback}}}], 0x20}}], 0x1, 0x0) 03:15:14 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b30") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) accept4(r1, 0x0, 0x0, 0x0) 03:15:14 executing program 0: 03:15:14 executing program 4: 03:15:15 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_team\x00', 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) r3 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r3, 0x1000008912, &(0x7f0000000000)) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 03:15:15 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:15 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b30") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) accept4(r1, 0x0, 0x0, 0x0) 03:15:15 executing program 0: 03:15:15 executing program 5: 03:15:15 executing program 4: 03:15:15 executing program 0: 03:15:15 executing program 4: 03:15:15 executing program 5: 03:15:15 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b30") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) accept4(r1, 0x0, 0x0, 0x0) 03:15:15 executing program 0: 03:15:15 executing program 5: 03:15:15 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_team\x00', 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) r3 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r3, 0x1000008912, &(0x7f0000000000)) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 03:15:15 executing program 4: 03:15:15 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) socket$inet6(0xa, 0x3, 0x6b) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:15 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:15:15 executing program 5: 03:15:15 executing program 0: 03:15:16 executing program 5: 03:15:16 executing program 4: 03:15:16 executing program 0: 03:15:16 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:15:16 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) socket$inet6(0xa, 0x3, 0x6b) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:16 executing program 4: [ 1411.533460][ C1] net_ratelimit: 14 callbacks suppressed [ 1411.533466][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1411.545443][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1411.783432][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1411.789865][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:15:16 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_team\x00', 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) r3 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0815b5055e0b") splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 03:15:16 executing program 0: 03:15:16 executing program 5: 03:15:16 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) socket$inet6(0xa, 0x3, 0x6b) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:16 executing program 4: 03:15:16 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:15:16 executing program 4: 03:15:16 executing program 3: 03:15:16 executing program 0: 03:15:16 executing program 5: 03:15:16 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x0, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:17 executing program 4: [ 1412.334705][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1412.340870][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1412.653462][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1412.659316][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:15:17 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_team\x00', 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) r3 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0815b5055e0b") splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 03:15:17 executing program 0: 03:15:17 executing program 3: 03:15:17 executing program 4: 03:15:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x0, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:17 executing program 5: 03:15:17 executing program 4: 03:15:17 executing program 3: 03:15:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x0, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:17 executing program 0: 03:15:17 executing program 5: 03:15:17 executing program 5: [ 1413.293446][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1413.299288][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:15:18 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_team\x00', 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) r3 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0815b5055e0b") splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 03:15:18 executing program 4: 03:15:18 executing program 3: 03:15:18 executing program 0: 03:15:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:18 executing program 5: 03:15:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:18 executing program 3: 03:15:18 executing program 4: 03:15:18 executing program 5: 03:15:18 executing program 0: 03:15:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:19 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_team\x00', 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) r3 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b") splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 03:15:19 executing program 4: semop(0x0, &(0x7f0000000140)=[{0x0, 0x3}], 0x1) 03:15:19 executing program 0: 03:15:19 executing program 3: 03:15:19 executing program 5: 03:15:19 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:19 executing program 3: 03:15:19 executing program 5: 03:15:19 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:19 executing program 0: 03:15:19 executing program 4: 03:15:19 executing program 5: 03:15:20 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_team\x00', 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) r3 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b") splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 03:15:20 executing program 0: 03:15:20 executing program 3: 03:15:20 executing program 4: 03:15:20 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:20 executing program 5: 03:15:20 executing program 3: 03:15:20 executing program 4: 03:15:20 executing program 5: 03:15:20 executing program 0: 03:15:20 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0b") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:20 executing program 5: 03:15:21 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_team\x00', 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) r3 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b") splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 03:15:21 executing program 3: 03:15:21 executing program 4: 03:15:21 executing program 0: 03:15:21 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0b") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:21 executing program 5: 03:15:21 executing program 5: 03:15:21 executing program 4: 03:15:21 executing program 3: 03:15:21 executing program 0: 03:15:21 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0b") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) [ 1416.813419][ C0] net_ratelimit: 16 callbacks suppressed [ 1416.813428][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1416.825045][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:15:21 executing program 3: [ 1417.453445][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1417.459625][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:15:22 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_team\x00', 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) r3 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b30") splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 03:15:22 executing program 0: 03:15:22 executing program 5: 03:15:22 executing program 4: 03:15:22 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:22 executing program 3: 03:15:22 executing program 4: 03:15:22 executing program 5: 03:15:22 executing program 0: 03:15:22 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:22 executing program 3: 03:15:22 executing program 4: [ 1417.773453][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1417.779278][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1418.013431][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1418.019422][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:15:23 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_team\x00', 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) r3 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b30") splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 03:15:23 executing program 5: 03:15:23 executing program 0: 03:15:23 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:23 executing program 3: 03:15:23 executing program 4: 03:15:23 executing program 3: 03:15:23 executing program 0: 03:15:23 executing program 4: 03:15:23 executing program 5: 03:15:23 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b30") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) [ 1418.574599][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1418.580417][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:15:23 executing program 3: 03:15:23 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_team\x00', 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) r3 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b30") splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 03:15:23 executing program 4: 03:15:23 executing program 0: 03:15:23 executing program 5: 03:15:23 executing program 3: 03:15:23 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b30") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:24 executing program 3: 03:15:24 executing program 5: 03:15:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b30") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:24 executing program 4: 03:15:24 executing program 0: 03:15:24 executing program 3: 03:15:24 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_team\x00', 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) r2 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ffe1, 0x0) 03:15:24 executing program 5: 03:15:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:24 executing program 4: 03:15:24 executing program 0: 03:15:24 executing program 3: 03:15:24 executing program 3: 03:15:24 executing program 5: 03:15:24 executing program 0: 03:15:25 executing program 4: 03:15:25 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:25 executing program 3: 03:15:25 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_team\x00', 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) r2 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ffe1, 0x0) 03:15:25 executing program 5: 03:15:25 executing program 0: 03:15:25 executing program 4: 03:15:25 executing program 3: 03:15:25 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:25 executing program 0: 03:15:25 executing program 4: 03:15:25 executing program 3: 03:15:25 executing program 5: 03:15:25 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:25 executing program 3: 03:15:26 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_team\x00', 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) r2 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ffe1, 0x0) 03:15:26 executing program 4: 03:15:26 executing program 0: 03:15:26 executing program 5: 03:15:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:26 executing program 3: 03:15:26 executing program 4: [ 1421.933452][ C1] net_ratelimit: 14 callbacks suppressed [ 1421.933459][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1421.945238][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:15:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) 03:15:26 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x400, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000200), 0xc) connect$inet6(0xffffffffffffffff, 0x0, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) socket(0x0, 0x803, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000dc0)=[{0x0}], 0x1, 0x81808) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) write(0xffffffffffffffff, &(0x7f0000cc2fed), 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r1, &(0x7f0000000640)="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", 0x131, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 03:15:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x208, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) symlink(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='./file1\x00') execve(&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) r2 = dup2(r0, r1) open$dir(&(0x7f0000000380)='./file0\x00', 0x841, 0x0) clone(0x3102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 03:15:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) readv(r0, &(0x7f0000001540)=[{&(0x7f0000000080)=""/7, 0x7}, {0x0}, {0x0}, {0x0}], 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001a00)=[{&(0x7f00000002c0)=""/71, 0x47}, {0x0}, {0x0}, {0x0}], 0x4}, 0x0) shutdown(r2, 0x0) [ 1422.173425][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1422.179388][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1422.743844][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1422.749744][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:15:27 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_team\x00', 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) r3 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe1, 0x0) 03:15:27 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:27 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x2143, 0x0, 0x0) 03:15:27 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000000)=ANY=[]) 03:15:27 executing program 4: r0 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r1 = dup(r0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) io_submit(r4, 0x4110, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) 03:15:27 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x400, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000200), 0xc) connect$inet6(0xffffffffffffffff, 0x0, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) socket(0x0, 0x803, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000dc0)=[{0x0}], 0x1, 0x81808) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) write(0xffffffffffffffff, &(0x7f0000cc2fed), 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r1, &(0x7f0000000640)="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", 0x131, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 03:15:27 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000001200)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)=0x900) 03:15:27 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x1000004e21, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000080)={@link_local, @random="3777077ea3db", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 03:15:27 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0xfffffffffffffdec) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000000)=0x1000, 0xffffffffffffff0b) recvmmsg(r1, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) [ 1423.053406][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1423.059272][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:15:27 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/\x00~WMz\x0f0\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xe8\xd3\x83dx-c\xb6a(T\xb2\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e\t\x00\x00\x00\x88\xa4H\xce\x98]\x92\agm0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\n\xd8\x1e\xd8\xda2NDcq\xef\x1eu\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xeb\x8e\x14\x03w\xaao\xb3\x17\x00\xf18\xdcM~\b\xd5|(*g\xdeZu\xc5G\x1f\x81\x00\x00\x00\x00\x00\x00\x00\x9bS\x98\x17\xdb\xa7\x7fK\x93\xcf\xe7-\x19\\I\x1f\xb6\'d\xfce\x92\xe0m\xd0\xa7\xf6:\xbb\xd4\xc6\xe3/_\xa1\x9fnM\xc0t\xd8$\xfc|i\x80@\xc7\xe8\xb2q6\xfa\xd5~b\x89B\xb4i\xeeGh\\\x94\"\xbf\xc1\x99*Lv\xa4\xa3\x91&\xd2\x14\x02\xb9g-*\xa0\xf8\x9b\x04,\xa8\x98%-\x1e%\xf8L\x01\xbe\x87\xd4\x8c\x9d\x9c\r9\xfb#\x1d\xd7\xc0\xe6E\x81\x16c\xeaN\xb8\xfb\x06\xd2\x01\a\xc7\x9e\xb1\x85Xu\xc9v\xe5X\xe6\xe3\xf3\x16\xc4\x88\x03%M3\xec=c\x84\xeb\xc2\xb0\x87\xfdb\xa9\xa4\xe6\xd8\xe5\xeaq/\x1e\xbcW\xec+\xa3f\x9a\x91Tr\xe0N\\\xc5\xb8\x91\xbb\xa5a\xc7OzWcr\xdd\xeb2\xa8\xd2=7}\'B\xcb\xcb\x97\xb7\x99\x03\x85z\xb1\xb4\x84\xd8,\xb4{\x80\xec7\x96\f\x03~\x9b\xfa_0\x82\xc4\xaaD\xa2\x8cU\x96\xa66\xa5\xf4\xeb\xc2\xe3=P\xee\xee\xe2o\xa6\xa2\xbf\x9b\xa2\v\xb9\x9ewi\x94\x1a\xf2\x98\x19\x18\xfdR\xed:\x10-\xaeJ\x92{KA\xda|\xabl|\xfe\xaaKK\xb2:', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400012) 03:15:27 executing program 3: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, 0x0) r0 = creat(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) r2 = dup2(r1, r1) r3 = dup2(r2, r0) execve(0x0, 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000280)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r3, 0x8905, 0x0) 03:15:28 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_team\x00', 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) r3 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe1, 0x0) 03:15:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001340)=[{&(0x7f00000010c0)=""/246, 0xf6}, {0x0}, {0x0}, {0x0}], 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xa1720495f3f7edd, 0x0, 0x0, 0x800e00516) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r2, 0xffff, 0x1006, &(0x7f0000000000)={0x9}, 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x51, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0x893f, 0x0, 0x0, 0x800e00519) shutdown(r1, 0x0) shutdown(r2, 0x0) 03:15:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001340)=[{&(0x7f00000010c0)=""/246, 0xf6}, {0x0}, {0x0}], 0x3) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xa1720495f3f7edd, 0x0, 0x0, 0x800e00516) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r2, 0xffff, 0x1006, &(0x7f0000000000)={0x9}, 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x50, &(0x7f0000000040)={0x0, {{0x10, 0x2}}}, 0x90) recvfrom$inet(r2, 0x0, 0x893f, 0x0, 0x0, 0x800e00519) shutdown(r1, 0x0) shutdown(r2, 0x0) 03:15:28 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x2, &(0x7f0000000240), 0x4) 03:15:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000000140)="1400000013000507ed0064d24ef862450558c653", 0x14}], 0x1, 0x0, 0x0, 0x300}, 0x0) [ 1423.693486][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1423.699404][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:15:28 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000240), 0x4) 03:15:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001340)=[{&(0x7f00000010c0)=""/246, 0xf6}, {0x0}, {0x0}, {0x0}], 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xa1720495f3f7edd, 0x0, 0x0, 0x800e00516) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x50, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0x893f, 0x0, 0x0, 0x800e00519) shutdown(r1, 0x0) shutdown(r2, 0x0) 03:15:28 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000240), 0x4) 03:15:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001340)=[{&(0x7f00000010c0)=""/246, 0xf6}, {0x0}, {0x0}, {0x0}], 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xa1720495f3f7edd, 0x0, 0x0, 0x800e00516) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r2, 0xffff, 0x1006, &(0x7f0000000000)={0x9}, 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x50, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0x893f, 0x0, 0x0, 0x800e00519) shutdown(r1, 0x0) shutdown(r2, 0x0) 03:15:28 executing program 5: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 03:15:28 executing program 0: setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000200), 0xc) connect$inet6(0xffffffffffffffff, 0x0, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x51ea809d148a581a, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) socket(0x0, 0x803, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000dc0)=[{0x0}, {&(0x7f0000000c80)="3a1d5018ff082e9b04714072445ce063521de85b95643dc07cb189c9d7c7c9782f3b88e8ba17a586e8bd3a983fb4c710060b06e61f65d8ec7ff9d0bf5ffb628db8cd81b3d02d728f2ea4cd957012cf36", 0x50}], 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) write(0xffffffffffffffff, &(0x7f0000cc2fed)="130000003e0005ffffe3ffbd000026", 0xf) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x0, &(0x7f0000000400)}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 03:15:28 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000240), 0x4) [ 1424.055860][T27854] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1424.203070][T27854] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:15:29 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_team\x00', 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) r3 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe1, 0x0) 03:15:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f000001c000)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) 03:15:29 executing program 4: r0 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lblcr\x00'}, 0x2c) 03:15:29 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, 0x0, 0x0) 03:15:29 executing program 5: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 03:15:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x102, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630a77fbac14140ce0", 0x0, 0x9}, 0x28) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x181c00, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:15:29 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, 0x0, 0x0) 03:15:29 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) [ 1424.681014][T27909] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. 03:15:29 executing program 3: r0 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r1 = dup(r0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) io_submit(r4, 0x4110, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) [ 1424.788267][T27909] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:15:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x102, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630a77fbac14140ce0", 0x0, 0x9}, 0x28) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x181c00, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:15:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001340)=[{&(0x7f00000010c0)=""/246, 0xf6}, {0x0}, {0x0}, {0x0}], 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xa1720495f3f7edd, 0x0, 0x0, 0x800e00516) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x51, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0x893f, 0x0, 0x0, 0x800e00519) shutdown(r1, 0x0) shutdown(r2, 0x0) 03:15:29 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, 0x0, 0x0) 03:15:30 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_team\x00', 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) r3 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 03:15:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x102, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000631477fbac14140ce0", 0x0, 0x9}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:15:30 executing program 2: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x0, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 03:15:30 executing program 0: mknod(&(0x7f0000000040)='./bus\x00', 0x201003, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0xb00, 0x0) ppoll(&(0x7f00000002c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:15:30 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(0x0, 0x0, 0x0, 0x0, r2) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000280)={0x0, 0x1, 0x86}, &(0x7f0000000340)=ANY=[@ANYBLOB], &(0x7f00000003c0)="0e", &(0x7f0000000400)=""/134) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f00000004c0)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x1) open(&(0x7f0000000440)='./bus\x00', 0x141046, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x800, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) ioctl$KVM_NMI(r3, 0xae9a) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x22000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:15:30 executing program 5: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) syz_open_procfs(0x0, &(0x7f0000000100)='comm\x00') syz_open_procfs(0x0, &(0x7f00000000c0)='net/arp\x00') syz_open_procfs(0x0, &(0x7f0000000100)='comm\x00') socketpair$unix(0x1, 0x0, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmsg(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000180)=""/107, 0x6b}], 0x1, &(0x7f0000000240)=""/32, 0x20}, 0x60018121) r0 = gettid() clone(0x6e20cf00, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 1425.633458][T27959] IPVS: ftp: loaded support on port[0] = 21 03:15:30 executing program 4: 03:15:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001340)=[{&(0x7f00000010c0)=""/246, 0xf6}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xa1720495f3f7edd, 0x0, 0x0, 0x800e00516) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x51, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0x893f, 0x0, 0x0, 0x800e00519) shutdown(r1, 0x0) shutdown(r2, 0x0) 03:15:30 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 03:15:30 executing program 4: fsopen(&(0x7f0000000000)='bdev\x00', 0x0) [ 1425.846696][T28173] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1425.860527][T28173] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:15:30 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 03:15:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) readv(r0, &(0x7f0000001540)=[{&(0x7f0000000080)=""/7, 0x7}, {0x0}, {0x0}, {0x0}], 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001a00)=[{&(0x7f00000002c0)=""/71, 0x47}, {0x0}, {0x0}, {0x0}], 0x4}, 0x0) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) shutdown(r4, 0x0) readv(r2, &(0x7f0000000000)=[{&(0x7f0000000440)=""/222, 0x126}], 0x1) shutdown(r5, 0x0) shutdown(r2, 0x0) [ 1425.949711][T27946] IPVS: ftp: loaded support on port[0] = 21 [ 1425.983963][T28282] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1426.025605][T28282] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1426.363550][ T246] tipc: TX() has been purged, node left! 03:15:31 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_team\x00', 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) r3 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 03:15:31 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, 0x0) 03:15:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 03:15:31 executing program 5: 03:15:31 executing program 4: 03:15:31 executing program 0: 03:15:31 executing program 0: 03:15:31 executing program 4: 03:15:31 executing program 5: [ 1426.500195][T28401] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1426.540141][T28401] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:15:31 executing program 0: 03:15:31 executing program 4: 03:15:31 executing program 5: [ 1427.213425][ C0] net_ratelimit: 16 callbacks suppressed [ 1427.213430][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1427.224941][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:15:31 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_team\x00', 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) r3 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 03:15:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 03:15:31 executing program 0: 03:15:31 executing program 4: 03:15:31 executing program 5: 03:15:31 executing program 2: 03:15:32 executing program 5: 03:15:32 executing program 4: 03:15:32 executing program 0: 03:15:32 executing program 2: [ 1427.376543][T28530] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. 03:15:32 executing program 4: [ 1427.445682][T28530] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:15:32 executing program 5: [ 1427.854091][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1427.859958][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:15:32 executing program 2: 03:15:32 executing program 3: 03:15:32 executing program 0: 03:15:32 executing program 4: 03:15:32 executing program 5: [ 1428.173454][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1428.179431][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:15:32 executing program 3: 03:15:32 executing program 0: 03:15:32 executing program 1: 03:15:32 executing program 4: 03:15:32 executing program 5: 03:15:32 executing program 2: 03:15:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 03:15:33 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000016) 03:15:33 executing program 0: 03:15:33 executing program 4: 03:15:33 executing program 5: [ 1428.413406][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1428.419206][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:15:33 executing program 2: 03:15:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(0x0, 0x0, 0x0, 0x0, r2) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000280)={0x0, 0x1, 0x86}, 0x0, &(0x7f00000003c0)="0e", &(0x7f0000000400)=""/134) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) ptrace(0x4200, r4) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) open(0x0, 0x141046, 0x0) open(&(0x7f0000000440)='./bus\x00', 0x141046, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x800, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0x663abba741622feb) ioctl$KVM_NMI(r3, 0xae9a) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:15:33 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) getpeername(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}) 03:15:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=@ipv4_newroute={0x24, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x8}]}, 0x24}}, 0x0) 03:15:33 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000016) 03:15:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) [ 1428.640830][T28591] netlink: 'syz-executor.5': attribute type 21 has an invalid length. 03:15:33 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x101}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:15:33 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x2, &(0x7f00000008c0)=[{0x0}, {&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de6", 0xd9, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:15:33 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000016) 03:15:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 03:15:33 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_hci(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)) [ 1428.973429][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1428.979232][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:15:33 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000016) 03:15:33 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x135}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:15:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0xaaaaaaaaaaaac03, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) accept4(0xffffffffffffffff, &(0x7f0000000480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, &(0x7f0000000000)=0x80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000002, 0x0, 0x0, 0x0, 0x4cb], 0x12000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:15:34 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000640)='/dev/capi20\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) 03:15:34 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 03:15:34 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) 03:15:34 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 1429.622961][T28879] kvm_hv_set_msr: 240 callbacks suppressed [ 1429.622972][T28879] kvm [28864]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x4000006b data 0x4d00000000f [ 1429.641773][T28879] kvm [28864]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000039 data 0x4d00000000f [ 1429.654455][T28879] kvm [28864]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000007 data 0x4d00000000f [ 1429.669372][T28879] kvm [28864]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x4000003f data 0x4d00000000f [ 1429.719427][T28879] kvm [28864]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x4000000d data 0x4d00000000f [ 1429.746314][T28879] kvm [28864]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000077 data 0x4d00000000f [ 1429.757665][T28879] kvm [28864]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000045 data 0x4d00000000f [ 1429.772485][T28879] kvm [28864]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000013 data 0x4d00000000f [ 1429.788910][T28879] kvm [28864]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x4000007d data 0x4d00000000f [ 1429.800414][T28879] kvm [28864]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x4000004b data 0x4d00000000f 03:15:36 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) unshare(0x40000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext={0x9, 0x7}, 0x800, 0x0, 0x633}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f00000002c0)={'filter\x00', 0x4, [{}, {}, {}, {}]}, 0x68) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) 03:15:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r1 = creat(0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000280)=""/117) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e20, @remote}, 0x10) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, 0x0) setsockopt$sock_int(r2, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendto$inet(r2, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 03:15:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 03:15:36 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, 0x0, &(0x7f00000003c0)="0e", 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) ptrace(0x4200, r3) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) lstat(0x0, 0x0) open(0x0, 0x141046, 0x0) open(&(0x7f0000000440)='./bus\x00', 0x141046, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x800, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0x663abba741622feb) ioctl$KVM_NMI(r2, 0xae9a) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x22000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:15:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0xaaaaaaaaaaaac03, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) accept4(0xffffffffffffffff, &(0x7f0000000480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, &(0x7f0000000000)=0x80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000002, 0x0, 0x0, 0x0, 0x4cb], 0x12000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:15:36 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) [ 1431.892925][T29078] IPVS: ftp: loaded support on port[0] = 21 03:15:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 03:15:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0xaaaaaaaaaaaac03, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) accept4(0xffffffffffffffff, &(0x7f0000000480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, &(0x7f0000000000)=0x80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000002, 0x0, 0x0, 0x0, 0x4cb], 0x12000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:15:36 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_int(r0, 0x0, 0x31, &(0x7f0000000240)=0x6, 0x4) 03:15:36 executing program 4: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 03:15:36 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) recvmmsg(r0, &(0x7f0000000980)=[{{&(0x7f0000000080)=@xdp, 0x80, 0x0}}], 0x1, 0x8020, 0x0) 03:15:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0xaaaaaaaaaaaac03, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) accept4(0xffffffffffffffff, &(0x7f0000000480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, &(0x7f0000000000)=0x80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000002, 0x0, 0x0, 0x0, 0x4cb], 0x12000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1432.333445][ C1] net_ratelimit: 14 callbacks suppressed [ 1432.333452][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1432.345033][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1432.573473][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1432.579291][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1433.134286][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1433.140970][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1433.253608][T29078] IPVS: ftp: loaded support on port[0] = 21 [ 1433.453445][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1433.459458][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1434.093458][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1434.099307][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:15:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) ptrace$getsig(0x4202, 0x0, 0x5, 0x0) listen(r0, 0xfffffffffffffff9) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) memfd_create(0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xe, 0x20040884, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x1) recvfrom$inet6(r1, &(0x7f0000000040)=""/31, 0x1f, 0x0, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0)='A', 0x1, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, 0x0, 0x0) dup2(r0, r1) 03:15:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 03:15:39 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) r0 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) fcntl$getflags(0xffffffffffffffff, 0x401) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) sigaltstack(&(0x7f0000001000/0x2000)=nil, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/100, 0x64}, {&(0x7f0000000340)=""/180, 0xb4}, {&(0x7f0000000240)=""/12, 0xc}], 0x4}}, {{&(0x7f0000000680)=@rc, 0x80, &(0x7f0000003180)=[{&(0x7f0000000700)=""/66, 0x42}, {&(0x7f0000001fc0)=""/4096, 0x1000}, {&(0x7f0000000780)=""/134, 0x86}, {&(0x7f00000008c0)=""/63, 0x3f}, {&(0x7f0000000980)=""/100, 0x64}, {&(0x7f0000000a00)=""/131, 0x83}, {&(0x7f0000002fc0)=""/216, 0xd8}, {&(0x7f00000030c0)=""/129, 0x81}], 0x8}, 0x1}, {{&(0x7f0000003240)=@can, 0x80, 0x0, 0x0, &(0x7f0000004540)=""/199, 0xc7}, 0x8}], 0x3, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) iopl(0x0) sched_setattr(0x0, 0x0, 0x0) 03:15:39 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) 03:15:39 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) unshare(0x40000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext={0x9, 0x7}, 0x800, 0x0, 0x633}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f00000002c0)={'filter\x00', 0x4, [{}, {}, {}, {}]}, 0x68) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) 03:15:39 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x20b) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$alg(r2, &(0x7f00000000c0)=[{0x0, 0xff00, 0x0, 0x0, &(0x7f0000002780)=[@op={0x18, 0x29}], 0x18}], 0x146, 0x0) 03:15:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) [ 1434.625193][ T531] tipc: TX() has been purged, node left! 03:15:39 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xef, 0x209e21, 0x100008000000001, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000000c0), &(0x7f0000000180)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f00000000c0), &(0x7f00000000c0)="d6"}, 0x20) [ 1434.696822][T29679] IPVS: ftp: loaded support on port[0] = 21 03:15:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 03:15:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 03:15:40 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) tkill(r0, 0x1000000000016) 03:15:40 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 03:15:40 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 03:15:40 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) [ 1437.300115][T29542] bridge0: port 2(bridge_slave_1) entered disabled state [ 1437.307966][T29542] bridge0: port 1(bridge_slave_0) entered disabled state [ 1437.613440][ C0] net_ratelimit: 16 callbacks suppressed [ 1437.613448][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1437.625106][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1438.253454][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1438.259311][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1438.573416][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1438.579342][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1438.813451][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1438.819401][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1439.373437][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1439.379331][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:15:44 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xef, 0x209e21, 0x100008000000001}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f00000000c0), &(0x7f00000000c0)="d6"}, 0x20) 03:15:44 executing program 1: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 03:15:46 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) 03:15:46 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) tkill(r0, 0x1000000000016) 03:15:46 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = socket$rxrpc(0x21, 0x2, 0xa) sendto$rxrpc(r1, 0x0, 0x0, 0x0, &(0x7f0000000340)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x24) 03:15:46 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xef, 0x209e21, 0x100008000000001, 0x1}, 0x3c) 03:15:46 executing program 1: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 03:15:46 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xef, 0x209e21, 0x100008000000001, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000000c0), &(0x7f0000000180)}, 0x20) 03:15:46 executing program 1: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 03:15:46 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xef, 0x209e21, 0x100008000000001, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000000c0), &(0x7f0000000180)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f00000000c0), &(0x7f00000000c0)}, 0x20) 03:15:46 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") socket$packet(0x11, 0x2, 0x300) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$alg(r1, &(0x7f00000000c0)=[{0x0, 0xff00, 0x0, 0x0, &(0x7f0000002780)=[@op={0x18, 0x29}], 0x18}], 0x146, 0x0) 03:15:46 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) 03:15:46 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x1000000000004e24, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xb}}}, 0x1c) sendmmsg(r1, &(0x7f0000001c80)=[{{&(0x7f0000000100)=@nfc_llcp={0x27, 0x1, 0x1, 0x1, 0x3f, 0x7, "33f94fa052a5783ecda713b567540164b6560ca44ab8af89d1a9497887341e504b92fc12883e7dade9db930f738b8715ad5adb62377539eaf4fc9b4d64c780", 0x3c}, 0x80, &(0x7f0000001680)=[{&(0x7f0000000200)="ff64d592b071b672879b704a29da6389724d86ac825af964eea29e37046501391bfd4536725d9f76f8b6052b6c8c1dfd0a054a5fa4d706812f264e5b45608387f0e8bcdb08c67ac0e1f6349bc51fdff94c670de71f5fd7308ac31a5362cd5536dd20871fd853572c310bba85093519886bf511f0dce04fb0e651213f397a88c5a79d6cfe1b0af82deae0ab3bc64cba690872de4c14983d0b40d8c5b99771a24403177b5dd759ebe7950ce95ec01fa9e58b597905dfb3f87560459c0e5d7c0d396b28827997c4d5b76aab5c0c51af42717cb68e8c149c37", 0xd7}, {&(0x7f0000000300)="27afd4c5e3b497b611579ed69a31fedae3aadd424236a16cef0235d9834ddd11839da58e27afb3433b093bd13799b9ed29d6c06faa6e8b9d81121472be8e92dfe6bce7d023da8c8d29d568dc8bba07a6598ea8d58dda3f0230366efc3e164b0e9d9ec6455e872c669721838aec870522973a69062e71717195d360db628ecbccd453f79f48837ad1f96be639e32154176412d5", 0x93}, {&(0x7f00000003c0)="700cc5f08bbce88eb642b5759047b6313c19122f6f4e62a48fd71e05e1d30dc1e6e89ccf2c78d82ca757e4ad98c955ff115745e2b86dba2a948335cc00d24350cb91182aef95d8f325a6814ce09c7a97f11459f753035f591814824eb63473df43c63e8f", 0x64}, {&(0x7f0000000440)="e9126bc48866f426bcd7cae8d172a2ad2a969a4b9329bc9e9df8e0065dc4992601b51591bb71fb9c40bcfd0ef949bd44863f622771c677639befd4a7088b6fca86390c93a2158e17be23f2f18376cbc9ca33dd979546b8796c5314c24825b46e88cc8fe4d73b91b021eab28eb74b1c5719788384d689ba41f9d5912e1750471b0063e05b09815edd2dd547044645174eea293b17fd2e5b29bbd0007e7bc6df9ed2c3f24f6977d70ce961b543374e2b33e145bc6e2101ae44c0378779b60675d092cbde326365645afea9a2c3a496", 0xce}, {0x0}, {&(0x7f0000001600)="ce9160d780fe4af7568747c8951daab8f7af9afe26c97573c704987b793a58fe8054b4dee04f8ae1c06d745d49bd825ca667de6b42c9cee60f174463c4bc0277c934db6441a2ea49ab272f9e75fc22c8410ae83764418b1b1e488b269cced30de5add4170f", 0x65}], 0x6, &(0x7f0000001700)=[{0x10}], 0x10}}, {{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001a40)="cf252c2d67acf3", 0x7}, {&(0x7f0000001a80)="169d5e0e7bbc9611b5abe041d85a539932a56e9cd23715f3c1b360a8dd341fc4258a7e3e558498d92ef90088468638094f5f94c775697c01ca18e539da04d00194a6b5885c80d8feeb5414082dccc912964b183d33c809fd9fc6c5e3e34d452d066b8f76814c2bfbd23668224956528f7f0ea971d9f7f3fd690e7852a711a4a43863ce9c3899a23da1a0ab0a4edb139c36676a4641aea3f5c4eb6af02620a6578ed6204255223499bb58e049d58b2d01905ae20042f861d81a", 0xb9}], 0x2, &(0x7f0000001b80)=[{0xf8, 0x115, 0x1, "c5dcca40d69e3d73b02ddef093891a9a5e1ab480a637f9bfbfc87fb8c4b6cf7b6f77e6d6fec7bb9db70c849fa753975e08388d5740a813e6512dd7fe0d09597b92d27d3788298d08678aa47ce25ccfcaacdc44207c8977e6601e945e0c6411edf67fd417fddd2ddac1b93c594734e96ac7437b03c6bff1b98da310c2747655307f4502097b410fcbe1c78f08e3fa3fb6a9745219decd2f102df984ac4fce2ed3b0a7873e0c3bf9911693f4e5a327ec006eed599bc2e09ee530c30b303bc52872fd23c223f6207fce10f0649446e74757b5b5550747bc0accc79cc951e159caf912e7009498b8"}], 0xf8}}], 0x2, 0x0) 03:15:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 03:15:46 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xef, 0x209e21, 0x100008000000001}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000000c0), &(0x7f0000000180)}, 0x20) [ 1442.733439][ C1] net_ratelimit: 12 callbacks suppressed [ 1442.733446][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1442.745084][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1442.973427][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1442.979429][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1443.533542][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1443.539619][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1443.773403][ T531] tipc: TX() has been purged, node left! 03:15:49 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) tkill(r0, 0x1000000000016) 03:15:49 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r1, 0x11, 0x65, &(0x7f0000000040), &(0x7f0000000100)=0x4) 03:15:49 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS_OLD(r1, 0x80984120, 0x0) 03:15:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 03:15:49 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS_OLD(r1, 0x40084149, 0x0) 03:15:49 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000004c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d460234432479aed75d492b41fd983f79e651996156a07607672c59957ab364bf68e64385faa53367f05f4ad61421349f2f11e931d8002ac57c7131347df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab00f0866f15da7f48295eb1000000000000", 0xa4}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x40, 0x0, 0xfffffffffffffc52, 0x0, 0x2ba}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:15:49 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) readahead(r2, 0x0, 0x0) 03:15:49 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000700)='./bus\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) readahead(r1, 0x400, 0x3) [ 1444.413050][T30340] ptrace attach of "/root/syz-executor.0"[30339] was attempted by "/root/syz-executor.0"[30340] 03:15:49 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = socket$netlink(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f00000004c0)=0x1e, 0x4) r2 = socket$netlink(0x10, 0x3, 0x8000000004) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000040)=0x16, 0x4) writev(r2, &(0x7f00000002c0)=[{&(0x7f0000000300)="580000001400192340834b80043f679a10ffff7f4e32f61b26a054e8b0f23d12cdf1e422000000000100804824ca945f64009400050028925aaa000000000000008400f0ff00ff050000000010000100090ac2d00b0ccbd8", 0x58}], 0x1) 03:15:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) [ 1444.493467][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1444.499315][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:15:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000640)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ce3f9ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0d86dc37f4c7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b7b04a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428620de4cdd6f53c419ce3105418200000000000100012c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b224636ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae52ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc8461539aa440fc948bb4b6e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d819164300"}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x7) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:15:49 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000400), 0x8) [ 1444.813408][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1444.819246][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:15:52 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000016) 03:15:52 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 03:15:52 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000240)={0x1}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) 03:15:52 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) syz_open_procfs(0x0, 0x0) flock(r1, 0x1) socketpair$unix(0x1, 0x0, 0x0, 0x0) 03:15:52 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x801000008912, &(0x7f0000000080)="0815b5055e0bcfe87b3071") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='veth0_to_team\x00', 0x10) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @multicast1}, 0x10) r2 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f00000000c0)={@multicast1, @local, @local}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, 0x0, 0x0) 03:15:52 executing program 2: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000140)=0x20) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000000)={0x1}, 0x8) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x240002e3) 03:15:52 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 03:15:52 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 03:15:52 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0xc02812f8, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "1c69ab0d058b1b678397214eec9ff0d0cc8773ebb2cfd89b0252317a845d3df759d280ad530ff887d31ed8f9bf42b889fadb99a5defc79bd6b2023939c49224f", "e9af2deca424f1d69c3cef2acc10d15cae4da1bf9b1c974dd2de2185a2ae81bbcb58ebaa0b202596b0b84f59798e42bca13b7dd7218fcb5e75d1d7299ff17955", "804c0e6791e9da90dce632e1e4efa40c25402952a8dd77a5bf0805cfc3425350"}) 03:15:52 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8475071") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000d40)={0x19, 0x4, 0x4, 0xf0, 0x0, 0x1}, 0x21f) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r1, 0x0, 0x0}, 0x20) 03:15:52 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8475071") write$binfmt_aout(r1, &(0x7f0000000100)=ANY=[@ANYPTR], 0x8) splice(r0, 0x0, r2, 0x0, 0x802000004, 0x6) 03:15:52 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8475071") setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x4080000000000701, 0x4) unshare(0x400) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e22, 0x0, @ipv4}, 0x1b) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000000)=0x10001, 0x2) recvfrom$inet6(r0, 0x0, 0x0, 0x2023, 0x0, 0x2d3) [ 1448.653445][ C0] net_ratelimit: 12 callbacks suppressed [ 1448.653452][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1448.665078][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1448.973480][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1448.979395][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1449.213573][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1449.219408][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1449.773456][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1449.779460][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:15:55 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000016) 03:15:55 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000c000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00f17eeee090f302e0f23d9660f3806581ebad004b0beeef30f122af8f8a100b000ee", 0x28}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) clock_gettime(0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb], 0x12000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:15:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 03:15:55 executing program 5: r0 = socket$inet(0x2, 0x200000002, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={'lo\x00', {0x2, 0x0, @loopback}}) socket$l2tp(0x18, 0x1, 0x1) 03:15:55 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) accept4(0xffffffffffffffff, &(0x7f0000000480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, &(0x7f0000000000)=0x80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x60, 0x0, 0x0, 0x4cb], 0x12000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:15:55 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffc}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002e80)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) getpeername$inet6(r2, 0x0, &(0x7f0000000080)) 03:15:55 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x2, &(0x7f0000000140)=[{}, {0x200000000006, 0x0, 0x0, 0xfffffffc}]}) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') sendfile(r0, r0, &(0x7f0000000180)=0x74000000, 0x0) [ 1450.625095][ T23] audit: type=1326 audit(1575256555.280:79): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=31022 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d4ba code=0xffff0000 03:15:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) [ 1450.683185][ T23] audit: type=1326 audit(1575256555.330:80): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=31038 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d4ba code=0xffff0000 03:15:55 executing program 0: sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)}, 0x0) faccessat(0xffffffffffffff9c, 0x0, 0x0, 0x500) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x80000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1450.733432][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1450.739369][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:15:55 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffc}]}) execve(0x0, 0x0, 0x0) 03:15:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffc}]}) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) [ 1450.915521][ T23] audit: type=1326 audit(1575256555.570:81): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=31154 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d4ba code=0xffff0000 03:15:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) [ 1450.979292][ T23] audit: type=1326 audit(1575256555.630:82): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=31162 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d4ba code=0xffff0000 [ 1451.367273][ T23] audit: type=1326 audit(1575256556.020:83): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=31022 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d4ba code=0xffff0000 [ 1451.483755][ T23] audit: type=1326 audit(1575256556.140:84): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=31038 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d4ba code=0xffff0000 [ 1451.664423][ T23] audit: type=1326 audit(1575256556.320:85): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=31154 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d4ba code=0xffff0000 [ 1451.776984][ T23] audit: type=1326 audit(1575256556.430:86): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=31162 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d4ba code=0xffff0000 03:15:58 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000016) 03:15:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 03:15:58 executing program 2: 03:15:58 executing program 5: 03:15:58 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = socket(0x200040000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2711, 0x0, &(0x7f00000000c0)) 03:15:58 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB='$\x00\x00\x00^\x00\a\x00'/20, @ANYRES32, @ANYBLOB="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"], 0x24}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x52136a5252f3b2, 0x0) 03:15:58 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x2, 0x1, 0x1}, 0x20) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x14}, 0x14}}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, 0x0, 0x0}, 0x20) 03:15:58 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x3, &(0x7f0000000280)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xf, 0x47}}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfc76, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffe77}, 0x48) 03:15:58 executing program 2: 03:15:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 03:15:58 executing program 4: 03:15:58 executing program 2: [ 1453.933446][ C1] net_ratelimit: 12 callbacks suppressed [ 1453.933453][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1453.946801][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1454.893498][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1454.899391][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1455.213508][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1455.220326][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1455.463532][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1455.469668][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1456.013459][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1456.019265][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:16:01 executing program 4: 03:16:01 executing program 5: 03:16:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 03:16:01 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(0x0, 0x1000000000016) 03:16:01 executing program 0: 03:16:01 executing program 2: 03:16:01 executing program 4: 03:16:01 executing program 0: 03:16:01 executing program 5: 03:16:01 executing program 2: 03:16:01 executing program 4: 03:16:01 executing program 0: 03:16:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, 0x0) 03:16:02 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(0x0, 0x1000000000016) 03:16:02 executing program 2: 03:16:02 executing program 5: 03:16:02 executing program 4: 03:16:02 executing program 0: 03:16:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, 0x0) 03:16:02 executing program 2: 03:16:02 executing program 0: 03:16:02 executing program 4: 03:16:02 executing program 5: 03:16:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, 0x0) 03:16:02 executing program 0: 03:16:03 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(0x0, 0x1000000000016) 03:16:03 executing program 2: 03:16:03 executing program 4: 03:16:03 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x5000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, 0x0, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0x14) 03:16:03 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:03 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000240)) 03:16:03 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x5000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, 0x0, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1e, 0x0, &(0x7f0000000080)) 03:16:03 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r1, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x138) getsockopt$bt_hci(r1, 0x0, 0x1, 0x0, &(0x7f0000000040)) 03:16:03 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000240)) 03:16:03 executing program 2: 03:16:03 executing program 2: 03:16:03 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000240)) [ 1459.053498][ C0] net_ratelimit: 8 callbacks suppressed [ 1459.053506][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1459.065139][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:16:03 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000016) 03:16:03 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000002f00050300000000faffff080d"], 0x1}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10003, 0x0) 03:16:03 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0xa}], 0x1c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000040)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f0000000100)=0x98) 03:16:03 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") getsockopt$inet6_mreq(r0, 0x29, 0x3a, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) [ 1459.373407][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1459.381885][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:16:04 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:04 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x8000003}) pwrite64(r2, &(0x7f0000000600)="4ebe", 0x2, 0x0) 03:16:04 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") getsockopt$inet6_mreq(r0, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) 03:16:04 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) writev(r1, &(0x7f0000000400)=[{&(0x7f00000001c0)='j', 0x1}], 0x1) 03:16:04 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='lblcr\x00', 0x0) write$tun(r0, &(0x7f0000000000)=ANY=[@ANYRES32], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000140)={0x0, @local, 0x0, 0x0, 'lblcr\x00'}, 0x2c) 03:16:04 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") getsockopt$inet6_mreq(r0, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) 03:16:04 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:04 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") getsockopt$inet6_mreq(r0, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) [ 1459.613438][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1459.619448][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:16:04 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000016) 03:16:04 executing program 4: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x1000080002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') getdents64(r2, &(0x7f0000000380)=""/87, 0x192) getdents64(r2, &(0x7f0000000080)=""/167, 0xa7) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57, 0x39}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x3c) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) 03:16:04 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") getsockopt$inet6_mreq(r0, 0x29, 0x3c, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) 03:16:04 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") getsockopt$inet6_mreq(r0, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) [ 1460.173414][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1460.179330][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:16:05 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:05 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) getsockopt$inet6_mreq(r0, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) 03:16:05 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x4, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @dev}}]}, 0x28}}, 0x0) 03:16:05 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = socket(0xa, 0x1, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) recvfrom$rose(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 03:16:05 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) getsockopt$inet6_mreq(r0, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) 03:16:05 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:05 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") getsockopt$inet6_mreq(r0, 0x29, 0x35, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) 03:16:05 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) getsockopt$inet6_mreq(r0, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) 03:16:05 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000016) 03:16:05 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000cffff0)={&(0x7f0000000840)=@allocspi={0xf8, 0x16, 0x9, 0x0, 0x0, {{{@in, @in=@broadcast}, {@in6=@mcast2, 0x0, 0x33}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0xa}}}, 0xf8}}, 0x0) 03:16:05 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) 03:16:05 executing program 2: setrlimit(0x6, &(0x7f0000000180)) mlockall(0x1) socket(0x0, 0x0, 0x0) [ 1461.143554][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1461.149402][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:16:05 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:05 executing program 4: sync() openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/u:andoo\x00', 0xf9850d0e43c48c51, 0x0) 03:16:05 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) 03:16:05 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f00000028c0), 0x0, 0x0, 0x0) time(0x0) chroot(0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) perf_event_open(0x0, 0x0, 0x10004, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @broadcast}, 0x10) bind$inet(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) 03:16:05 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) 03:16:06 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:06 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1080210b1065ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x3b) 03:16:06 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") getsockopt$inet6_mreq(r0, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) 03:16:06 executing program 3: futex(0x0, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000016) 03:16:06 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$2(0x2, 0x0, &(0x7f00000000c0)=""/250) 03:16:06 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[], 0x1f000}) 03:16:06 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") getsockopt$inet6_mreq(r0, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) 03:16:06 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) socket$inet6(0xa, 0x3, 0x6b) 03:16:06 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = add_key$keyring(0x0, &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000280)={0x0, 0x1, 0x86}, &(0x7f0000000340)=ANY=[@ANYBLOB="656e633d706b63733120686173683d7368613531322d617678000000000000000000000000000b00000000000000330c000000000000000067d400000000000000cb4e94e752a4b955000000000000"], &(0x7f00000003c0)="0e", &(0x7f0000000400)=""/134) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) memfd_create(0x0, 0x0) r4 = getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) ptrace(0x4200, r4) ptrace$pokeuser(0x6, 0x0, 0x388, 0x0) lstat(0x0, &(0x7f00000004c0)) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, 0x0, {0x9}}, 0x18) open(&(0x7f0000000440)='./bus\x00', 0x141046, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x1) open(&(0x7f0000000440)='./bus\x00', 0x141046, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0x663abba741622feb) ioctl$KVM_NMI(r3, 0xae9a) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x22000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:16:06 executing program 3: futex(0x0, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000016) 03:16:06 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") getsockopt$inet6_mreq(r0, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) 03:16:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f0000000b00)=@rc, 0x80, 0x0, 0x0, &(0x7f0000001e40)=""/239, 0xef}}, {{&(0x7f0000003300)=@tipc=@id, 0x80, &(0x7f00000049c0)=[{&(0x7f0000003380)=""/83, 0x53}, {0x0}, {0x0}, {&(0x7f0000004580)=""/203, 0xcb}, {0x0}, {&(0x7f00000048c0)=""/218, 0xda}], 0x6, &(0x7f0000004a40)=""/243, 0xf3}}], 0x20004582, 0x2, 0x0) socket$inet6(0xa, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) dup(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) close(r2) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) 03:16:07 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) socket$inet6(0xa, 0x3, 0x6b) 03:16:07 executing program 3: futex(0x0, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000016) 03:16:07 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") getsockopt$inet6_mreq(r0, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) 03:16:07 executing program 3: futex(&(0x7f000000cffc), 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000016) 03:16:07 executing program 2: open(&(0x7f0000000080)='./file0\x00', 0x2442, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fremovexattr(r0, &(0x7f0000000140)=@known='user.syz\x00') 03:16:07 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000280)={0x0, 0x1, 0x86}, &(0x7f0000000340)=ANY=[@ANYBLOB="656e633d706b63733120686173683d7368613531322d617678000000000000000000000000000b00000000000000330c000000000000000067d40000"], &(0x7f00000003c0)="0e", &(0x7f0000000400)=""/134) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) memfd_create(0x0, 0x0) r4 = getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) ptrace(0x4200, r4) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000440)='./bus\x00', 0x141046, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) open(&(0x7f0000000440)='./bus\x00', 0x141046, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x800, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0x663abba741622feb) ioctl$KVM_NMI(r3, 0xae9a) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x22000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:16:07 executing program 3: futex(&(0x7f000000cffc), 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000016) [ 1462.618243][ T23] audit: type=1804 audit(1575256567.270:87): pid=747 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir287465210/syzkaller.JEk8gZ/1106/file0" dev="sda1" ino=16534 res=1 [ 1462.666506][ T23] audit: type=1804 audit(1575256567.300:88): pid=747 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir287465210/syzkaller.JEk8gZ/1106/file0" dev="sda1" ino=16534 res=1 03:16:07 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) socket$inet6(0xa, 0x3, 0x6b) 03:16:07 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") getsockopt$inet6_mreq(r0, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) 03:16:07 executing program 3: futex(&(0x7f000000cffc), 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000016) 03:16:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000080)={'lo\x00', {0x2, 0x0, @remote}}) 03:16:07 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x59534158b2d5f03c, @perf_bp={0x0}, 0x10020, 0x0, 0x0, 0x0, 0x40000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_submit(0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x1600bd77, &(0x7f0000000300)={'mangle\x00'}, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x40) getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) ioctl$KVM_GET_MSR_INDEX_LIST(r2, 0xc004ae02, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) write$9p(r3, &(0x7f0000001400), 0x0) setsockopt$XDP_UMEM_FILL_RING(r3, 0x11b, 0x5, 0x0, 0xfffffffffffffd3d) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r4, &(0x7f00000017c0), 0x3a8, 0x0) sendfile(r4, r2, 0x0, 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) eventfd2(0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r5}]}, &(0x7f0000000440)='syzkaller\x00', 0x7, 0x270, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) getrandom(0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$KVM_SET_BOOT_CPU_ID(r2, 0xae78, &(0x7f00000000c0)=0x2) syz_open_dev$vcsn(0x0, 0x1, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb701, 0x0) 03:16:07 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) socket$inet6(0xa, 0x3, 0x6b) 03:16:07 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x3, 0x29021) write$evdev(r0, &(0x7f0000000040)=[{{0x77359400}, 0x4}], 0xfdda) 03:16:07 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000016) 03:16:07 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") getsockopt$inet6_mreq(r0, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) 03:16:07 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)=""/139) 03:16:08 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000016) 03:16:08 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000500)='./bus\x00', 0x89d32c2, 0x0) close(r0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) ioctl$LOOP_GET_STATUS(r0, 0x4c05, &(0x7f0000000000)) 03:16:08 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) socket$inet6(0xa, 0x3, 0x6b) 03:16:08 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000016) 03:16:08 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") getsockopt$inet6_mreq(r0, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) 03:16:08 executing program 2: r0 = open(&(0x7f0000000500)='./bus\x00', 0x89d32c2, 0x0) close(r0) syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$LOOP_GET_STATUS(r0, 0x1261, 0x0) 03:16:08 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x8) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) write$evdev(0xffffffffffffffff, &(0x7f0000000340)=[{{0x0, 0x2710}, 0x5, 0x401}, {{}, 0x0, 0x8, 0x9}, {{r0, r1/1000+10000}, 0x3, 0x9, 0xfffeffff}, {{}, 0x11, 0x0, 0x7}], 0x60) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='\x00\a\x00\x00\xbd\x01[\xc0\x00\x00\x00\x00\x00G\xe3U:Q<\x16%\x98\xff\xf2\xbe\xeb\x88i\x16\x02\xb5\x83\x19\xf3w\x18\xc7\x96\x05\x00y\x93\xd3W\xc4-l\xcf\xa5R\xf4RF\xf2.Ihm\xe2\x86\xd2\xf1\xd6\xb6\xff<\xa4}\xcb\x99\x9fq\x1dF\xe0\x05Y\xfex\x0f\x17\xf7s\xd51\xdf\xeb\x87tT&|i\xc9\xa8\x95\\\xf2\xb5\ay\xc8\xc8R\x92\xf1#\x9bsm\xf6F\x83\xd7\x13L\x94\xf8}\xc7m>\xe4]\xde\xfa=d\xc5\xf7\x115\xd7!w\xda\xd3H\x06c)\xb4\xf3\xbc\x0f\xe3V\x9d\xf8\x8b|1\r\xd4X\xae\\\xd5\x9a4J\n\xac\xd1\x9f\a\xa0\xf6\x97zr\x0f\x04\x00\x00\x00\x1f\xe0\f,\x9e\x13\xdf\xf4\xc3)mzB\xe0Y\xc3n|M\xc5\xf7?\x94\xfb\x19\x9b\xefS\xf8zi0\xb5v\xde\xed\x8cl\xe9\x0e-\xef\x9dN&%\x80A\xacn\x8c~7\x18\x94\x94\xd9\x8f\xd1\xe13\xd9\xa6\xb3\xa7\xf3\xcf\xb3,\x9b\xd8x\x94\xbe\x8f\xcf?\xda\v\xe7\xd2!\x8c\xa8\xe3F\x81\xee\x1c\x1c\xa7\xbcnU!R\xbc,T\xbeA\xe3\x15E\x15:f0\"\x9fJ\xc1}\xeeu\'\x7f\xc1\x1c\xcb\x04\xf34F[\xf7\xc8VK\xad\x90\x00'/332) mmap(&(0x7f00009d1000/0x4000)=nil, 0x4000, 0x1000004, 0x37010, r2, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) add_key(&(0x7f0000000180)='keyring\x00NX*\b\xf7\xb3\xb9\xa6\x80v!\x04G\xad`\xaa}\xfb^\xbd\xf9p\xfb\x9f\x84\x9c1\x81:\xde^\xba@\x12`\xc6\xa8\x86\x12\xc8\xb9(p\a\xe7U\x1cT9', &(0x7f0000000840)={'syz', 0x0}, &(0x7f0000000980)="130cdd023042dc47a8862472f1c1f52e7de8c676035b05c582199fea2f6c13a4a1c9d32ef615a19846ffbd0da2bce4eccfacba10e81beb7fe0d94635c6860c15d26d598e4b2c400d1fe5123737f3d3ef24", 0x51, 0xfffffffffffffffc) r3 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x3, 0x29021) write$evdev(r3, &(0x7f0000000040)=[{{0x77359400}, 0x11, 0xf}], 0xfdda) r4 = open(0x0, 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r4, &(0x7f00000000c0)='./file0\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000a80)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0) open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r5 = add_key$keyring(&(0x7f0000000380), 0x0, 0x0, 0x0, 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000180), 0x0) keyctl$link(0x8, r5, 0x0) 03:16:08 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) socket$inet6(0xa, 0x3, 0x6b) 03:16:08 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000016) 03:16:08 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") getsockopt$inet6_mreq(r0, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) 03:16:08 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4a9590c35c4a84296697ab4390af9a9ceafd07e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:08 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") getsockopt$inet6_mreq(r0, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) 03:16:08 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000016) [ 1464.333412][ C1] net_ratelimit: 12 callbacks suppressed [ 1464.333419][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1464.347061][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:16:09 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x0, &(0x7f0000000000)="0815b5055e0bcfe87b3071") getsockopt$inet6_mreq(r0, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) 03:16:09 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:09 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x8) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) write$evdev(0xffffffffffffffff, &(0x7f0000000340)=[{{0x0, 0x2710}, 0x5, 0x401}, {{}, 0x0, 0x8, 0x9}, {{r0, r1/1000+10000}, 0x3, 0x9, 0xfffeffff}, {{}, 0x11, 0x0, 0x7}], 0x60) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='\x00\a\x00\x00\xbd\x01[\xc0\x00\x00\x00\x00\x00G\xe3U:Q<\x16%\x98\xff\xf2\xbe\xeb\x88i\x16\x02\xb5\x83\x19\xf3w\x18\xc7\x96\x05\x00y\x93\xd3W\xc4-l\xcf\xa5R\xf4RF\xf2.Ihm\xe2\x86\xd2\xf1\xd6\xb6\xff<\xa4}\xcb\x99\x9fq\x1dF\xe0\x05Y\xfex\x0f\x17\xf7s\xd51\xdf\xeb\x87tT&|i\xc9\xa8\x95\\\xf2\xb5\ay\xc8\xc8R\x92\xf1#\x9bsm\xf6F\x83\xd7\x13L\x94\xf8}\xc7m>\xe4]\xde\xfa=d\xc5\xf7\x115\xd7!w\xda\xd3H\x06c)\xb4\xf3\xbc\x0f\xe3V\x9d\xf8\x8b|1\r\xd4X\xae\\\xd5\x9a4J\n\xac\xd1\x9f\a\xa0\xf6\x97zr\x0f\x04\x00\x00\x00\x1f\xe0\f,\x9e\x13\xdf\xf4\xc3)mzB\xe0Y\xc3n|M\xc5\xf7?\x94\xfb\x19\x9b\xefS\xf8zi0\xb5v\xde\xed\x8cl\xe9\x0e-\xef\x9dN&%\x80A\xacn\x8c~7\x18\x94\x94\xd9\x8f\xd1\xe13\xd9\xa6\xb3\xa7\xf3\xcf\xb3,\x9b\xd8x\x94\xbe\x8f\xcf?\xda\v\xe7\xd2!\x8c\xa8\xe3F\x81\xee\x1c\x1c\xa7\xbcnU!R\xbc,T\xbeA\xe3\x15E\x15:f0\"\x9fJ\xc1}\xeeu\'\x7f\xc1\x1c\xcb\x04\xf34F[\xf7\xc8VK\xad\x90\x00'/332) mmap(&(0x7f00009d1000/0x4000)=nil, 0x4000, 0x1000004, 0x37010, r2, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) add_key(&(0x7f0000000180)='keyring\x00NX*\b\xf7\xb3\xb9\xa6\x80v!\x04G\xad`\xaa}\xfb^\xbd\xf9p\xfb\x9f\x84\x9c1\x81:\xde^\xba@\x12`\xc6\xa8\x86\x12\xc8\xb9(p\a\xe7U\x1cT9', &(0x7f0000000840)={'syz', 0x0}, &(0x7f0000000980)="130cdd023042dc47a8862472f1c1f52e7de8c676035b05c582199fea2f6c13a4a1c9d32ef615a19846ffbd0da2bce4eccfacba10e81beb7fe0d94635c6860c15d26d598e4b2c400d1fe5123737f3d3ef24", 0x51, 0xfffffffffffffffc) r3 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x3, 0x29021) write$evdev(r3, &(0x7f0000000040)=[{{0x77359400}, 0x11, 0xf}], 0xfdda) r4 = open(0x0, 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r4, &(0x7f00000000c0)='./file0\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000a80)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0) open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r5 = add_key$keyring(&(0x7f0000000380), 0x0, 0x0, 0x0, 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000180), 0x0) keyctl$link(0x8, r5, 0x0) 03:16:09 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000016) 03:16:09 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4a9590c35c4a84296697ab4390af9a9ceafd07e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:09 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x0, &(0x7f0000000000)="0815b5055e0bcfe87b3071") getsockopt$inet6_mreq(r0, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) 03:16:09 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:09 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x0, &(0x7f0000000000)="0815b5055e0bcfe87b3071") getsockopt$inet6_mreq(r0, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) 03:16:09 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000016) 03:16:09 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:09 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) 03:16:09 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) 03:16:09 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x8) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) write$evdev(0xffffffffffffffff, &(0x7f0000000340)=[{{0x0, 0x2710}, 0x5, 0x401}, {{}, 0x0, 0x8, 0x9}, {{r0, r1/1000+10000}, 0x3, 0x9, 0xfffeffff}, {{}, 0x11, 0x0, 0x7}], 0x60) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='\x00\a\x00\x00\xbd\x01[\xc0\x00\x00\x00\x00\x00G\xe3U:Q<\x16%\x98\xff\xf2\xbe\xeb\x88i\x16\x02\xb5\x83\x19\xf3w\x18\xc7\x96\x05\x00y\x93\xd3W\xc4-l\xcf\xa5R\xf4RF\xf2.Ihm\xe2\x86\xd2\xf1\xd6\xb6\xff<\xa4}\xcb\x99\x9fq\x1dF\xe0\x05Y\xfex\x0f\x17\xf7s\xd51\xdf\xeb\x87tT&|i\xc9\xa8\x95\\\xf2\xb5\ay\xc8\xc8R\x92\xf1#\x9bsm\xf6F\x83\xd7\x13L\x94\xf8}\xc7m>\xe4]\xde\xfa=d\xc5\xf7\x115\xd7!w\xda\xd3H\x06c)\xb4\xf3\xbc\x0f\xe3V\x9d\xf8\x8b|1\r\xd4X\xae\\\xd5\x9a4J\n\xac\xd1\x9f\a\xa0\xf6\x97zr\x0f\x04\x00\x00\x00\x1f\xe0\f,\x9e\x13\xdf\xf4\xc3)mzB\xe0Y\xc3n|M\xc5\xf7?\x94\xfb\x19\x9b\xefS\xf8zi0\xb5v\xde\xed\x8cl\xe9\x0e-\xef\x9dN&%\x80A\xacn\x8c~7\x18\x94\x94\xd9\x8f\xd1\xe13\xd9\xa6\xb3\xa7\xf3\xcf\xb3,\x9b\xd8x\x94\xbe\x8f\xcf?\xda\v\xe7\xd2!\x8c\xa8\xe3F\x81\xee\x1c\x1c\xa7\xbcnU!R\xbc,T\xbeA\xe3\x15E\x15:f0\"\x9fJ\xc1}\xeeu\'\x7f\xc1\x1c\xcb\x04\xf34F[\xf7\xc8VK\xad\x90\x00'/332) mmap(&(0x7f00009d1000/0x4000)=nil, 0x4000, 0x1000004, 0x37010, r2, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) add_key(&(0x7f0000000180)='keyring\x00NX*\b\xf7\xb3\xb9\xa6\x80v!\x04G\xad`\xaa}\xfb^\xbd\xf9p\xfb\x9f\x84\x9c1\x81:\xde^\xba@\x12`\xc6\xa8\x86\x12\xc8\xb9(p\a\xe7U\x1cT9', &(0x7f0000000840)={'syz', 0x0}, &(0x7f0000000980)="130cdd023042dc47a8862472f1c1f52e7de8c676035b05c582199fea2f6c13a4a1c9d32ef615a19846ffbd0da2bce4eccfacba10e81beb7fe0d94635c6860c15d26d598e4b2c400d1fe5123737f3d3ef24", 0x51, 0xfffffffffffffffc) r3 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x3, 0x29021) write$evdev(r3, &(0x7f0000000040)=[{{0x77359400}, 0x11, 0xf}], 0xfdda) r4 = open(0x0, 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r4, &(0x7f00000000c0)='./file0\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000a80)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0) open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r5 = add_key$keyring(&(0x7f0000000380), 0x0, 0x0, 0x0, 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000180), 0x0) keyctl$link(0x8, r5, 0x0) [ 1465.293407][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1465.299224][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:16:10 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:10 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) 03:16:10 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:10 executing program 4: r0 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r0, &(0x7f0000000180)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) [ 1465.613478][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1465.619550][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:16:10 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) [ 1465.853445][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1465.859934][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:16:10 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:10 executing program 4: r0 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r0, &(0x7f0000000180)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000140)="874c", 0x2}], 0x1}, 0xfc00) sendmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec={0xa}, 0x80, &(0x7f0000000100)=[{&(0x7f00000001c0)="00a5", 0x2}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) [ 1466.413485][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1466.419476][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:16:12 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:12 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000016) 03:16:12 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:12 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) 03:16:12 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:12 executing program 4: r0 = socket$kcm(0x2, 0x2, 0x73) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$inet(r0, &(0x7f0000002d80)=[{{&(0x7f0000000180)={0x2, 0x0, @remote}, 0x10, 0x0}}], 0x1, 0x0) 03:16:12 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)) getsockopt$inet6_mreq(r0, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) 03:16:12 executing program 4: r0 = socket$kcm(0x2, 0x2, 0x73) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$inet(r0, &(0x7f0000002d80)=[{{&(0x7f0000000180)={0x2, 0x0, @remote}, 0x10, 0x0}}], 0x1, 0x0) 03:16:12 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0b") getsockopt$inet6_mreq(r0, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) 03:16:13 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:13 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r3) 03:16:13 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0b") getsockopt$inet6_mreq(r0, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) [ 1468.488167][ T23] audit: type=1800 audit(1575256573.140:89): pid=1994 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16994 res=0 03:16:13 executing program 4: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000280)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b000000000008000d000372770101000000"], 0x30}}, 0x0) [ 1468.710361][ T2004] gretap0: refused to change device tx_queue_len [ 1469.453519][ C0] net_ratelimit: 9 callbacks suppressed [ 1469.453527][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1469.465385][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1469.773449][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1469.780755][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1470.013466][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1470.019406][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1470.573430][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1470.579797][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:16:15 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000016) 03:16:15 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0b") getsockopt$inet6_mreq(r0, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) 03:16:15 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:15 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e846"], 0x55) 03:16:15 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:15 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:15 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b") getsockopt$inet6_mreq(r0, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) 03:16:16 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4a9590c35c4a84296697ab4390af9a9ceafd07e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b") getsockopt$inet6_mreq(r0, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) 03:16:16 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e846"], 0x55) 03:16:16 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b") getsockopt$inet6_mreq(r0, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) [ 1471.533451][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1471.539505][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:16:18 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:18 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x10, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000016) 03:16:18 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:18 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e846"], 0x55) 03:16:18 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b30") getsockopt$inet6_mreq(r0, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) 03:16:18 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:18 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:18 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b30") getsockopt$inet6_mreq(r0, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) 03:16:19 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e846"], 0x55) 03:16:19 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b30") getsockopt$inet6_mreq(r0, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) 03:16:19 executing program 0: bind$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:19 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:19 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) [ 1474.733449][ C1] net_ratelimit: 12 callbacks suppressed [ 1474.733461][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1474.746048][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:16:19 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x10, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000016) 03:16:19 executing program 0: bind$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:19 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e846"], 0x55) 03:16:19 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) 03:16:19 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:19 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:19 executing program 0: bind$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:19 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:19 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x24, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) 03:16:19 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:19 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) 03:16:20 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") [ 1475.693473][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1475.701362][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:16:20 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x10, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000016) 03:16:20 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) 03:16:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:20 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:20 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e846"], 0x55) 03:16:20 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:20 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0x14) [ 1476.013431][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1476.019251][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1476.034822][ T2328] llc_conn_state_process: llc_conn_service failed 03:16:20 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:20 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") getsockopt$inet6_mreq(r0, 0x29, 0x24, 0x0, &(0x7f0000000280)) 03:16:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:20 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") getsockopt$inet6_mreq(r0, 0x29, 0x24, 0x0, &(0x7f0000000280)) [ 1476.253445][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1476.259718][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:16:21 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, 0x0, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000016) 03:16:21 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:21 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:21 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") getsockopt$inet6_mreq(r0, 0x29, 0x24, 0x0, &(0x7f0000000280)) 03:16:21 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e846"], 0x55) 03:16:21 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") [ 1476.813435][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1476.819459][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:16:21 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") getsockopt$inet6_mreq(r0, 0x29, 0x24, &(0x7f0000000240)={@remote}, 0x0) 03:16:21 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:21 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 1476.909097][ T2371] llc_conn_state_process: llc_conn_service failed 03:16:21 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:21 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") getsockopt$inet6_mreq(r0, 0x29, 0x24, &(0x7f0000000240)={@remote}, 0x0) 03:16:21 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:24 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, 0x0, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000016) 03:16:24 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:24 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") getsockopt$inet6_mreq(r0, 0x29, 0x24, &(0x7f0000000240)={@remote}, 0x0) 03:16:24 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:24 executing program 4: ioctl$SNDCTL_DSP_SPEED(0xffffffffffffffff, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e846"], 0x55) 03:16:24 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") [ 1479.863457][ C0] net_ratelimit: 8 callbacks suppressed [ 1479.863465][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1479.875273][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1479.925760][ T2406] llc_conn_state_process: llc_conn_service failed 03:16:24 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:24 executing program 1: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) socket$inet6(0xa, 0x0, 0x6b) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket(0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 03:16:24 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:24 executing program 4: ioctl$SNDCTL_DSP_SPEED(0xffffffffffffffff, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e846"], 0x55) 03:16:24 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:24 executing program 4: ioctl$SNDCTL_DSP_SPEED(0xffffffffffffffff, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e846"], 0x55) [ 1480.173433][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1480.179316][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1480.413475][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1480.420399][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1480.973441][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1480.979351][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1481.933458][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1481.940762][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:16:27 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, 0x0, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000016) 03:16:27 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:27 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x0, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:27 executing program 4: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e846"], 0x55) 03:16:27 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) sendmmsg$inet(r3, &(0x7f000000ce80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000600)="953d10c7e389e2c66c4de99e8d629554ea722744fee49a9ea4fa76dc9818560936395f46db9346cd70e901afed965ea3edda37f743f2189e7ea1ffe1a0a485f0e2c50f37dffb8d9a3ac46d07433f3f910755f3c1960e013e20d4950c78724d042a87", 0x62}, {&(0x7f0000000700)="a8249428d496847032a485caa84e38d967b083", 0x13}], 0x2, &(0x7f0000002e00)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @remote}}}, @ip_ttl={{0x14}}], 0x38}}], 0x2, 0x0) 03:16:27 executing program 5: bind$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(0xffffffffffffffff, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:27 executing program 4: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e846"], 0x55) 03:16:27 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000840)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:27 executing program 5: bind$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(0xffffffffffffffff, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:27 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 03:16:27 executing program 5: bind$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(0xffffffffffffffff, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:27 executing program 4: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e846"], 0x55) [ 1485.133416][ C1] net_ratelimit: 12 callbacks suppressed [ 1485.139242][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1485.145039][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:16:30 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000), &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000016) 03:16:30 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='cpuset.sched_load_balance\x00', 0x2, 0x0) ppoll(&(0x7f0000000100)=[{r2}, {}, {}], 0x3, 0x0, 0x0, 0x0) 03:16:30 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000840)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:30 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:30 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e846"], 0x55) 03:16:30 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x0, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:30 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e846"], 0x55) 03:16:30 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000840)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:30 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") [ 1486.103456][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1486.110071][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:16:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000440)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 03:16:30 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x0, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:30 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") [ 1486.302100][ T2517] device nr0 entered promiscuous mode [ 1486.413449][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1486.420304][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1486.653491][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1486.659466][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1486.800532][ T2524] device nr0 entered promiscuous mode [ 1487.213445][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1487.219390][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:16:33 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000), &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000016) 03:16:33 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e846"], 0x55) 03:16:33 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:33 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:33 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:33 executing program 1: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000640)='/dev/capi20\x00', 0x0, 0x0) r1 = epoll_create1(0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000080)={0x0, 0x0, 0x8001}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 03:16:33 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 1489.098649][ T2537] llc_conn_state_process: llc_conn_service failed 03:16:33 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(0xffffffffffffffff, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e846"], 0x55) 03:16:33 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001340)=[{&(0x7f00000010c0)=""/246, 0xf6}, {0x0}], 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xa1720495f3f7edd, 0x0, 0x0, 0x800e00516) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r2, 0xffff, 0x1006, &(0x7f0000000000)={0x9}, 0x10) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0x893f, 0x0, 0x0, 0x800e00519) shutdown(r1, 0x0) shutdown(r2, 0x0) 03:16:33 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1d, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:33 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1d, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 1490.253525][ C0] net_ratelimit: 8 callbacks suppressed [ 1490.253531][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1490.265409][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1490.583445][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1490.589383][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1490.813472][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1490.819456][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1491.373443][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1491.379362][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:16:36 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000), &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000016) 03:16:36 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1d, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001340)=[{&(0x7f00000010c0)=""/246, 0xf6}, {0x0}, {0x0}], 0x3) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xa1720495f3f7edd, 0x0, 0x0, 0x800e00516) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r2, 0xffff, 0x1006, &(0x7f0000000000)={0x9}, 0x10) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0x893f, 0x0, 0x0, 0x800e00519) shutdown(r1, 0x0) shutdown(r2, 0x0) 03:16:36 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(0xffffffffffffffff, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e846"], 0x55) 03:16:36 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:36 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:36 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2b, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e7"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 1492.152946][ T2579] llc_conn_state_process: llc_conn_service failed 03:16:36 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2b, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:36 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2b, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:36 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x33, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:36 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x33, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:37 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="0d00000000003639408fa3a3ba27660199159dffcf1e7feef541a3d2ed47be4a5d98d40b25218605ba97f593ecb4fafc822dfc9d35b2783dda1b0816722db3c91e6d5401790c01a40fe1b4be51d2d59c24e07d5f1991a298f71d69f0c8c4435cde565686eb23fe924640f2c3db27c596cb539a0749378e776a557a2c9386e84fe0b7e51226e430cc325358892100faca908bb7d45dabb66c1008613e367307c7b8380b6e3ad7e6f40d98", 0xaa}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) creat(0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1492.333424][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1492.339468][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1492.425090][ T2610] ptrace attach of "/root/syz-executor.1"[2609] was attempted by "/root/syz-executor.1"[2610] 03:16:39 executing program 1: sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 03:16:39 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000016) 03:16:39 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x33, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:39 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(0xffffffffffffffff, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e846"], 0x55) 03:16:39 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:39 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:39 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x36, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 1495.217351][ T2628] llc_conn_state_process: llc_conn_service failed 03:16:39 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x36, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:39 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x36, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:40 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x38, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:40 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x38, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:40 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x38, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 1495.533523][ C1] net_ratelimit: 12 callbacks suppressed [ 1495.533530][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1495.545390][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:16:40 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) [ 1496.493501][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1496.499338][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1496.593506][ T7] tipc: TX() has been purged, node left! [ 1496.813444][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1496.819240][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1497.063448][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1497.069365][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1497.623442][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1497.629252][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:16:42 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000016) 03:16:42 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, 0x0) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e846"], 0x55) 03:16:42 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x39, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:42 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:42 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, 0x0, 0x0) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:42 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) [ 1498.270508][ T2679] llc_conn_state_process: llc_conn_service failed 03:16:43 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x39, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:43 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:43 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:43 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x39, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:43 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, 0x0) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e846"], 0x55) 03:16:43 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x39, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4a9590c35c4a84296697ab4390af9a9ce"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 1499.824175][ T7] device bridge_slave_1 left promiscuous mode [ 1499.830416][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1499.874429][ T7] device bridge_slave_0 left promiscuous mode [ 1499.880823][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1500.653426][ C0] net_ratelimit: 8 callbacks suppressed [ 1500.653433][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1500.664854][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1501.213438][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1501.213491][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:16:45 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000016) 03:16:45 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:45 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x39, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:45 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, 0x0, 0x0) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:45 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, 0x0) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e846"], 0x55) [ 1501.312150][ T2921] llc_conn_state_process: llc_conn_service failed [ 1501.683768][ T7] device hsr_slave_0 left promiscuous mode [ 1501.723554][ T7] device hsr_slave_1 left promiscuous mode [ 1501.773172][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1501.780817][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1501.780871][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1501.798430][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1501.809918][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1501.869584][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1501.979014][ T7] bond0 (unregistering): Released all slaves [ 1502.121741][ T2915] IPVS: ftp: loaded support on port[0] = 21 [ 1502.272311][ T2915] chnl_net:caif_netlink_parms(): no params data found [ 1502.300352][ T2915] bridge0: port 1(bridge_slave_0) entered blocking state [ 1502.307820][ T2915] bridge0: port 1(bridge_slave_0) entered disabled state [ 1502.315681][ T2915] device bridge_slave_0 entered promiscuous mode [ 1502.323763][ T2915] bridge0: port 2(bridge_slave_1) entered blocking state [ 1502.330895][ T2915] bridge0: port 2(bridge_slave_1) entered disabled state [ 1502.338869][ T2915] device bridge_slave_1 entered promiscuous mode [ 1502.355054][ T2915] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1502.365893][ T2915] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1502.384756][ T2915] team0: Port device team_slave_0 added [ 1502.393417][ T2915] team0: Port device team_slave_1 added [ 1502.446486][ T2915] device hsr_slave_0 entered promiscuous mode [ 1502.483955][ T2915] device hsr_slave_1 entered promiscuous mode [ 1502.513439][ T2915] debugfs: Directory 'hsr0' with parent '/' already present! [ 1502.532526][ T2915] bridge0: port 2(bridge_slave_1) entered blocking state [ 1502.540422][ T2915] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1502.547788][ T2915] bridge0: port 1(bridge_slave_0) entered blocking state [ 1502.555418][ T2915] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1502.596880][ T2915] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1502.610387][T15394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1502.619826][T15394] bridge0: port 1(bridge_slave_0) entered disabled state [ 1502.632830][T15394] bridge0: port 2(bridge_slave_1) entered disabled state [ 1502.646867][ T2915] 8021q: adding VLAN 0 to HW filter on device team0 [ 1502.658335][T15394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1502.667740][T15394] bridge0: port 1(bridge_slave_0) entered blocking state [ 1502.674975][T15394] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1502.695062][ T8237] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1502.704457][ T8237] bridge0: port 2(bridge_slave_1) entered blocking state [ 1502.711517][ T8237] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1502.719825][ T8237] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1502.729795][ T8237] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1502.737131][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1502.737207][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1502.751815][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1502.771017][ T2915] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1502.782460][ T2915] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1502.796394][T28297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1502.805833][T28297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1502.814825][T28297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1502.832819][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1502.840822][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1502.852988][ T2915] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1502.913466][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1502.919426][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:16:47 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:16:47 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e846"], 0x55) 03:16:47 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x39, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:47 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, 0x0, 0x0) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:47 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:47 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e846"], 0x55) 03:16:47 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3a, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 1503.056155][ T3050] llc_conn_state_process: llc_conn_service failed 03:16:49 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, 0x0, 0x0) tkill(r0, 0x1000000000016) 03:16:49 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:49 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e846"], 0x55) 03:16:49 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3a, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:49 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:16:49 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x0, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:49 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x0, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:49 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, 0x0, 0x0) 03:16:49 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x0, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:49 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3a, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:49 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x0, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:49 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, 0x0, 0x0) [ 1505.933472][ C1] net_ratelimit: 16 callbacks suppressed [ 1505.933479][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1505.945240][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1506.265735][ T3102] IPVS: ftp: loaded support on port[0] = 21 [ 1506.327637][ T3102] chnl_net:caif_netlink_parms(): no params data found [ 1506.356132][ T3102] bridge0: port 1(bridge_slave_0) entered blocking state [ 1506.363800][ T3102] bridge0: port 1(bridge_slave_0) entered disabled state [ 1506.371560][ T3102] device bridge_slave_0 entered promiscuous mode [ 1506.379868][ T3102] bridge0: port 2(bridge_slave_1) entered blocking state [ 1506.387223][ T3102] bridge0: port 2(bridge_slave_1) entered disabled state [ 1506.395847][ T3102] device bridge_slave_1 entered promiscuous mode [ 1506.418652][ T3102] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1506.429815][ T3102] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1506.450890][ T3102] team0: Port device team_slave_0 added [ 1506.458363][ T3102] team0: Port device team_slave_1 added [ 1506.505351][ T3102] device hsr_slave_0 entered promiscuous mode [ 1506.563722][ T3102] device hsr_slave_1 entered promiscuous mode [ 1506.613516][ T3102] debugfs: Directory 'hsr0' with parent '/' already present! [ 1506.629571][ T3102] bridge0: port 2(bridge_slave_1) entered blocking state [ 1506.637055][ T3102] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1506.644438][ T3102] bridge0: port 1(bridge_slave_0) entered blocking state [ 1506.651485][ T3102] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1506.690498][ T3102] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1506.704667][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1506.712835][T24912] bridge0: port 1(bridge_slave_0) entered disabled state [ 1506.721310][T24912] bridge0: port 2(bridge_slave_1) entered disabled state [ 1506.729903][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1506.744463][ T3102] 8021q: adding VLAN 0 to HW filter on device team0 [ 1506.760775][T28297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1506.769520][T28297] bridge0: port 1(bridge_slave_0) entered blocking state [ 1506.776613][T28297] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1506.785450][T28297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1506.794517][T28297] bridge0: port 2(bridge_slave_1) entered blocking state [ 1506.801648][T28297] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1506.819469][T28297] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1506.828718][T28297] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1506.840714][T16059] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1506.858334][ T3102] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1506.869196][ T3102] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1506.881478][T16059] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1506.894914][T16059] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1506.903453][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1506.905119][T16059] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1506.909273][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1506.934361][ T3102] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1506.941846][T28297] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1506.949663][T28297] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1507.003406][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1507.009186][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1507.123449][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1507.129584][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1507.243430][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1507.249502][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:16:52 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, 0x0, 0x0) tkill(r0, 0x1000000000016) 03:16:52 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3a, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:52 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x0, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:52 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:52 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, 0x0, 0x0) 03:16:52 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) 03:16:52 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR], 0x28) 03:16:52 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3a, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4a9590c35c4a84296697ab4390af9a9ceafd07e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:52 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:52 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x0, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:52 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) 03:16:52 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") [ 1508.913534][ T7] tipc: TX() has been purged, node left! [ 1509.073434][ T7] tipc: TX() has been purged, node left! 03:16:55 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, 0x0, 0x0) tkill(r0, 0x1000000000016) 03:16:55 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3a, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4a9590c35c4a84296697ab4390af9a9ceafd07e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:55 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR], 0x28) 03:16:55 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:55 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) 03:16:55 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(0xffffffffffffffff, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:55 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(0xffffffffffffffff, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:55 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3a, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:55 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR], 0x28) 03:16:55 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:55 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(0xffffffffffffffff, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:55 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB], 0x28) [ 1511.053437][ C0] net_ratelimit: 18 callbacks suppressed [ 1511.053443][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1511.065061][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1511.453439][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1511.459348][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1511.533647][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1511.533698][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1511.613464][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1511.619310][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1512.173486][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1512.180052][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1512.542010][ T3306] IPVS: ftp: loaded support on port[0] = 21 [ 1512.735331][ T3306] chnl_net:caif_netlink_parms(): no params data found [ 1512.768500][ T3306] bridge0: port 1(bridge_slave_0) entered blocking state [ 1512.777354][ T3306] bridge0: port 1(bridge_slave_0) entered disabled state [ 1512.786921][ T3306] device bridge_slave_0 entered promiscuous mode [ 1512.796467][ T3306] bridge0: port 2(bridge_slave_1) entered blocking state [ 1512.805252][ T3306] bridge0: port 2(bridge_slave_1) entered disabled state [ 1512.820088][ T3306] device bridge_slave_1 entered promiscuous mode [ 1512.841536][ T3306] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1512.853188][ T3306] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1512.886492][ T3306] team0: Port device team_slave_0 added [ 1512.895393][ T3306] team0: Port device team_slave_1 added [ 1512.947154][ T3306] device hsr_slave_0 entered promiscuous mode [ 1512.993901][ T3306] device hsr_slave_1 entered promiscuous mode [ 1513.033459][ T3306] debugfs: Directory 'hsr0' with parent '/' already present! [ 1513.056939][ T3306] bridge0: port 2(bridge_slave_1) entered blocking state [ 1513.065000][ T3306] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1513.074372][ T3306] bridge0: port 1(bridge_slave_0) entered blocking state [ 1513.084629][ T3306] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1513.136030][ T3306] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1513.149939][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1513.160766][T24912] bridge0: port 1(bridge_slave_0) entered disabled state [ 1513.174870][T24912] bridge0: port 2(bridge_slave_1) entered disabled state [ 1513.185638][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1513.200436][ T3306] 8021q: adding VLAN 0 to HW filter on device team0 [ 1513.355845][ T8237] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1513.366023][ T8237] bridge0: port 1(bridge_slave_0) entered blocking state [ 1513.374365][ T8237] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1513.386696][ T8237] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1513.396964][ T8237] bridge0: port 2(bridge_slave_1) entered blocking state [ 1513.405390][ T8237] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1513.415780][ T8237] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1513.427548][ T8237] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1513.439860][T28297] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 03:16:58 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(0x0, 0x1000000000016) 03:16:58 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:58 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB], 0x28) 03:16:58 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3a, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 1513.454142][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1513.483522][ T3306] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1513.572262][ T3306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1513.586100][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1513.642511][T28297] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1513.687028][T28297] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1513.734515][ T3306] 8021q: adding VLAN 0 to HW filter on device batadv0 03:16:58 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:16:58 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:58 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) socket$inet6(0xa, 0x3, 0x6b) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:58 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3a, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:58 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB], 0x28) 03:16:58 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) socket$inet6(0xa, 0x3, 0x6b) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:58 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eed"], 0x3f) 03:16:58 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) socket$inet6(0xa, 0x3, 0x6b) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:59 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(0x0, 0x1000000000016) 03:16:59 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3a, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:59 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eed"], 0x3f) 03:16:59 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:16:59 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x0, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:59 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eed"], 0x3f) 03:16:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3a, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:59 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:59 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3a, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4a9590c35c4a84296697ab4390af9a9ceafd07e"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:59 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x0, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:59 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:59 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40d"], 0x4a) 03:16:59 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x0, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:16:59 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(0x0, 0x1000000000016) 03:16:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:16:59 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) [ 1515.264984][ T7] device bridge_slave_1 left promiscuous mode [ 1515.275504][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1515.344748][ T7] device bridge_slave_0 left promiscuous mode [ 1515.381562][ T7] bridge0: port 1(bridge_slave_0) entered disabled state 03:17:00 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, 0x0) 03:17:00 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40d"], 0x4a) [ 1515.450119][ T7] device bridge_slave_1 left promiscuous mode [ 1515.505945][ T7] bridge0: port 2(bridge_slave_1) entered disabled state 03:17:00 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, 0x0) [ 1515.595830][ T7] device bridge_slave_0 left promiscuous mode 03:17:00 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 1515.627357][ T7] bridge0: port 1(bridge_slave_0) entered disabled state 03:17:00 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40d"], 0x4a) 03:17:00 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, 0x0) [ 1516.093674][ C1] net_ratelimit: 26 callbacks suppressed [ 1516.093681][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1516.114732][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1516.333428][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1516.350733][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1517.293486][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1517.311289][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1517.853521][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1517.872577][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1518.183433][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1518.203487][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1520.255191][ T7] device hsr_slave_0 left promiscuous mode [ 1520.333900][ T7] device hsr_slave_1 left promiscuous mode [ 1520.402360][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1520.429861][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1520.444052][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1520.489380][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1520.611890][ T7] bond0 (unregistering): Released all slaves [ 1520.814194][ T7] device hsr_slave_0 left promiscuous mode [ 1520.853602][ T7] device hsr_slave_1 left promiscuous mode [ 1520.926076][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1520.941834][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1520.963195][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1521.030701][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1521.140345][ T7] bond0 (unregistering): Released all slaves 03:17:05 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:17:05 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)) 03:17:05 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66"], 0x50) 03:17:05 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x0) [ 1521.312493][ T3674] IPVS: ftp: loaded support on port[0] = 21 [ 1521.453417][ C0] net_ratelimit: 10 callbacks suppressed [ 1521.453424][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1521.465352][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1521.532019][ T3674] chnl_net:caif_netlink_parms(): no params data found [ 1521.569182][ T3674] bridge0: port 1(bridge_slave_0) entered blocking state [ 1521.576815][ T3674] bridge0: port 1(bridge_slave_0) entered disabled state [ 1521.586134][ T3674] device bridge_slave_0 entered promiscuous mode [ 1521.595516][ T3674] bridge0: port 2(bridge_slave_1) entered blocking state [ 1521.602822][ T3674] bridge0: port 2(bridge_slave_1) entered disabled state [ 1521.610832][ T3674] device bridge_slave_1 entered promiscuous mode [ 1521.630355][ T3674] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1521.644162][ T3674] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1521.666693][ T3674] team0: Port device team_slave_0 added [ 1521.678390][ T3674] team0: Port device team_slave_1 added [ 1521.735772][ T3674] device hsr_slave_0 entered promiscuous mode [ 1521.783738][ T3674] device hsr_slave_1 entered promiscuous mode [ 1521.823559][ T3674] debugfs: Directory 'hsr0' with parent '/' already present! [ 1521.844613][ T3674] bridge0: port 2(bridge_slave_1) entered blocking state [ 1521.853003][ T3674] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1521.860686][ T3674] bridge0: port 1(bridge_slave_0) entered blocking state [ 1521.868138][ T3674] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1521.915924][ T3674] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1521.928625][T28297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1521.942674][T28297] bridge0: port 1(bridge_slave_0) entered disabled state [ 1521.951360][T28297] bridge0: port 2(bridge_slave_1) entered disabled state [ 1521.968890][ T3674] 8021q: adding VLAN 0 to HW filter on device team0 [ 1521.987446][T28297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1522.001058][T28297] bridge0: port 1(bridge_slave_0) entered blocking state [ 1522.009054][T28297] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1522.018022][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1522.024091][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1522.049884][T16059] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1522.058918][T16059] bridge0: port 2(bridge_slave_1) entered blocking state [ 1522.067311][T16059] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1522.076683][T16059] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1522.085833][T16059] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1522.094869][T16059] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1522.104083][T16059] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1522.116998][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1522.128249][ T3674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1522.151572][T28297] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1522.160526][T28297] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1522.175116][ T3674] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1522.253469][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1522.259421][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:17:07 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:17:07 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:17:07 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)) 03:17:07 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:17:07 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66"], 0x50) 03:17:07 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x0) [ 1522.333410][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1522.339590][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1522.373404][ C0] protocol 88fb is buggy, dev hsr_slave_0 03:17:07 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") [ 1522.379238][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:17:07 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)) 03:17:07 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66"], 0x50) 03:17:07 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:17:07 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4"], 0x53) 03:17:07 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:17:07 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:17:07 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4"], 0x53) 03:17:07 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:17:07 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0b") 03:17:07 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:17:07 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x0) 03:17:07 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0b") 03:17:07 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x0, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:17:07 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4"], 0x53) 03:17:07 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:17:08 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0b") 03:17:08 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:17:08 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x0, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:17:08 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e8"], 0x54) 03:17:08 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b") 03:17:08 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b") 03:17:08 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x0, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:17:08 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:17:08 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:17:08 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b") 03:17:08 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e8"], 0x54) [ 1525.574327][ T3807] IPVS: ftp: loaded support on port[0] = 21 [ 1525.650819][ T3807] chnl_net:caif_netlink_parms(): no params data found [ 1525.680372][ T3807] bridge0: port 1(bridge_slave_0) entered blocking state [ 1525.691674][ T3807] bridge0: port 1(bridge_slave_0) entered disabled state [ 1525.700186][ T3807] device bridge_slave_0 entered promiscuous mode [ 1525.708149][ T3807] bridge0: port 2(bridge_slave_1) entered blocking state [ 1525.715707][ T3807] bridge0: port 2(bridge_slave_1) entered disabled state [ 1525.724125][ T3807] device bridge_slave_1 entered promiscuous mode [ 1525.745835][ T3807] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1525.757375][ T3807] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1525.782873][ T3807] team0: Port device team_slave_0 added [ 1525.792182][ T3807] team0: Port device team_slave_1 added [ 1525.845698][ T3807] device hsr_slave_0 entered promiscuous mode [ 1525.893824][ T3807] device hsr_slave_1 entered promiscuous mode [ 1525.953487][ T3807] debugfs: Directory 'hsr0' with parent '/' already present! [ 1525.969646][ T3807] bridge0: port 2(bridge_slave_1) entered blocking state [ 1525.977095][ T3807] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1525.984460][ T3807] bridge0: port 1(bridge_slave_0) entered blocking state [ 1525.991504][ T3807] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1526.030646][ T3807] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1526.042964][T16059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1526.051639][T16059] bridge0: port 1(bridge_slave_0) entered disabled state [ 1526.060533][T16059] bridge0: port 2(bridge_slave_1) entered disabled state [ 1526.069320][T16059] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1526.085674][ T3807] 8021q: adding VLAN 0 to HW filter on device team0 [ 1526.096256][T15394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1526.105142][T15394] bridge0: port 1(bridge_slave_0) entered blocking state [ 1526.112273][T15394] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1526.129860][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1526.138288][T30581] bridge0: port 2(bridge_slave_1) entered blocking state [ 1526.145400][T30581] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1526.164728][T15394] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1526.173855][T15394] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1526.182487][T15394] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1526.193850][T28297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1526.206102][ T3807] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1526.218718][ T3807] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1526.227957][T28297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1526.249710][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1526.258045][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1526.270739][ T3807] 8021q: adding VLAN 0 to HW filter on device batadv0 03:17:11 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:17:11 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4a9590c35c4a84296697ab4390af9a9ceafd07e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:17:11 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b30") 03:17:11 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e8"], 0x54) 03:17:11 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:17:11 executing program 3: socket$kcm(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000600)="4c000000120081ae08060c0f006b10007f03e3f7000000000a0000ca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e74703c48f93b8446b9bbc7a461eb886a5e54e8ff5", 0x4c}], 0x1}, 0x0) 03:17:11 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b30") 03:17:11 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e846"], 0x4d) 03:17:11 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:17:11 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4a9590c35c4a84296697ab4390af9a9ceafd07e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:17:11 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e846"], 0x4d) 03:17:11 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) socket$inet6(0xa, 0x3, 0x6b) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:17:12 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:17:12 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e846"], 0x4d) 03:17:12 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) socket$inet6(0xa, 0x3, 0x6b) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:17:12 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 03:17:12 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b30") [ 1528.769129][ T3867] IPVS: ftp: loaded support on port[0] = 21 [ 1528.833423][ T3867] chnl_net:caif_netlink_parms(): no params data found [ 1528.861079][ T3867] bridge0: port 1(bridge_slave_0) entered blocking state [ 1528.870608][ T3867] bridge0: port 1(bridge_slave_0) entered disabled state [ 1528.878791][ T3867] device bridge_slave_0 entered promiscuous mode [ 1528.889150][ T3867] bridge0: port 2(bridge_slave_1) entered blocking state [ 1528.896564][ T3867] bridge0: port 2(bridge_slave_1) entered disabled state [ 1528.905222][ T3867] device bridge_slave_1 entered promiscuous mode [ 1528.922345][ T3867] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1528.936091][ T3867] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1528.958169][ T3867] team0: Port device team_slave_0 added [ 1528.966516][ T3867] team0: Port device team_slave_1 added [ 1529.037509][ T3867] device hsr_slave_0 entered promiscuous mode [ 1529.094060][ T3867] device hsr_slave_1 entered promiscuous mode [ 1529.153532][ T3867] debugfs: Directory 'hsr0' with parent '/' already present! [ 1529.170095][ T3867] bridge0: port 2(bridge_slave_1) entered blocking state [ 1529.180988][ T3867] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1529.189252][ T3867] bridge0: port 1(bridge_slave_0) entered blocking state [ 1529.196627][ T3867] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1529.242728][ T3867] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1529.258356][T15394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1529.266871][T15394] bridge0: port 1(bridge_slave_0) entered disabled state [ 1529.279335][T15394] bridge0: port 2(bridge_slave_1) entered disabled state [ 1529.289096][T15394] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1529.301765][ T3867] 8021q: adding VLAN 0 to HW filter on device team0 [ 1529.327153][T15394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1529.335787][T15394] bridge0: port 1(bridge_slave_0) entered blocking state [ 1529.343780][T15394] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1529.352360][T15394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1529.361768][T15394] bridge0: port 2(bridge_slave_1) entered blocking state [ 1529.369086][T15394] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1529.392732][ T3867] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1529.403788][ T3867] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1529.417178][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1529.426944][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1529.439947][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1529.449486][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1529.458426][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1529.466651][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1529.483854][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1529.491567][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1529.502360][ T3867] 8021q: adding VLAN 0 to HW filter on device batadv0 03:17:14 executing program 3: socket$kcm(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000600)="4c000000120081ae08060c0f006b10007f03e3f7000000000a0000ca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e74703c48f93b8446b9bbc7a461eb886a5e54e8ff5", 0x4c}], 0x1}, 0x0) 03:17:14 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) socket$inet6(0xa, 0x3, 0x6b) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:17:14 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 03:17:14 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:17:14 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e846"], 0x51) 03:17:14 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 03:17:14 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x0, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:17:14 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4a9590c35c4a84296697ab4390af9a9ceafd07e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 03:17:14 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e846"], 0x51) 03:17:14 executing program 3: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB='#! ./file0 @'], 0xc) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 03:17:14 executing program 0: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000640)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000080)={0x0, 0x0, 0x8001}) 03:17:14 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:17:14 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x0, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:17:14 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYPTR, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e846"], 0x51) 03:17:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001340)=[{&(0x7f00000010c0)=""/246, 0xf6}, {0x0}], 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xa1720495f3f7edd, 0x0, 0x0, 0x800e00516) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0x893f, 0x0, 0x0, 0x800e00519) shutdown(r1, 0x0) shutdown(r2, 0x0) [ 1531.860354][ T4046] IPVS: ftp: loaded support on port[0] = 21 [ 1531.934236][ T4046] chnl_net:caif_netlink_parms(): no params data found [ 1531.969761][ T4046] bridge0: port 1(bridge_slave_0) entered blocking state [ 1531.979470][ T4046] bridge0: port 1(bridge_slave_0) entered disabled state [ 1531.987886][ T4046] device bridge_slave_0 entered promiscuous mode [ 1531.997217][ T4046] bridge0: port 2(bridge_slave_1) entered blocking state [ 1532.005701][ T4046] bridge0: port 2(bridge_slave_1) entered disabled state [ 1532.019340][ T4046] device bridge_slave_1 entered promiscuous mode [ 1532.039566][ T4046] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1532.050894][ T4046] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1532.072960][ T4046] team0: Port device team_slave_0 added [ 1532.086214][ T4046] team0: Port device team_slave_1 added [ 1532.135597][ T4046] device hsr_slave_0 entered promiscuous mode [ 1532.174042][ T4046] device hsr_slave_1 entered promiscuous mode [ 1532.223637][ T4046] debugfs: Directory 'hsr0' with parent '/' already present! [ 1532.241489][ T4046] bridge0: port 2(bridge_slave_1) entered blocking state [ 1532.249002][ T4046] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1532.256878][ T4046] bridge0: port 1(bridge_slave_0) entered blocking state [ 1532.263994][ T4046] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1532.303233][ T4046] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1532.317843][ T8237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1532.332426][ T8237] bridge0: port 1(bridge_slave_0) entered disabled state [ 1532.341663][ T8237] bridge0: port 2(bridge_slave_1) entered disabled state [ 1532.351078][ T8237] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1532.369687][ T4046] 8021q: adding VLAN 0 to HW filter on device team0 [ 1532.383147][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1532.392076][T24912] bridge0: port 1(bridge_slave_0) entered blocking state [ 1532.399309][T24912] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1532.416615][ T8237] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1532.425742][ T8237] bridge0: port 2(bridge_slave_1) entered blocking state [ 1532.432894][ T8237] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1532.452529][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1532.461566][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1532.474628][ T8237] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1532.491394][T28297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1532.503158][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1532.514877][ T4046] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1532.531421][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1532.539617][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1532.555773][ T4046] 8021q: adding VLAN 0 to HW filter on device batadv0 03:17:17 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:17:17 executing program 0: wait4(0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x6, 0x4, 0x200, 0x80000000000004, 0x0, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r0, &(0x7f0000000100), 0x0}, 0x20) 03:17:17 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:17:17 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x0, &(0x7f0000000000)="0815b5055e0bcfe87b3071") 03:17:17 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e846"], 0x4d) 03:17:17 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10052, r1, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x82, &(0x7f0000000180), 0x8) 03:17:17 executing program 3: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, 0x0, 0x0) 03:17:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2, 0x11) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='!\xa0') ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) close(r1) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) socket$kcm(0x10, 0x2, 0x4) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000280)=0x1) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(r1, &(0x7f0000000140)={0x0, 0x100000039, &(0x7f0000000000)=[{&(0x7f0000000380)=""/110, 0xffffffd9}], 0x1, 0x0, 0x4a}, 0x2f04) 03:17:17 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, 0x0) 03:17:17 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 03:17:17 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e846"], 0x4d) 03:17:17 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, 0x0) 03:17:18 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:17:18 executing program 3: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, 0x0, 0x0) 03:17:18 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e846"], 0x4d) 03:17:18 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, 0x0) 03:17:18 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4a9590c35c4a84296697ab4390af9a9ceafd07e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x60000000}, 0x40) 03:17:18 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)) 03:17:18 executing program 3: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, 0x0, 0x0) 03:17:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2, 0x11) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='!\xa0') ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) close(r1) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) socket$kcm(0x10, 0x2, 0x4) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000280)=0x1) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(r1, &(0x7f0000000140)={0x0, 0x100000039, &(0x7f0000000000)=[{&(0x7f0000000380)=""/110, 0xffffffd9}], 0x1, 0x0, 0x4a}, 0x2f04) 03:17:18 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x60000000}, 0x40) 03:17:18 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e846"], 0x41) 03:17:18 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:17:18 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)) 03:17:18 executing program 3: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, 0x0, 0x0) 03:17:18 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x60000000}, 0x40) 03:17:18 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e846"], 0x41) 03:17:18 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)) 03:17:18 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4a9590c35c4a84296697ab4390af9a9ceafd07e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000500), 0x0, 0x100, 0x60000000}, 0x40) 03:17:18 executing program 3: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, 0x0, 0x0) 03:17:18 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2a021, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYPTR, @ANYRES32, @ANYPTR, @ANYBLOB="720cc7618e59aeb8e0ef858be94901c9c43046ba413eede9c1ddf1a8689b2b8cd40dfdbb85537a66d2d9e4e846"], 0x41) 03:17:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2, 0x11) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='!\xa0') ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) close(r1) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) socket$kcm(0x10, 0x2, 0x4) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000280)=0x1) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(r1, &(0x7f0000000140)={0x0, 0x100000039, &(0x7f0000000000)=[{&(0x7f0000000380)=""/110, 0xffffffd9}], 0x1, 0x0, 0x4a}, 0x2f04) 03:17:19 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0b") 03:17:19 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4a9590c35c4a84296697ab4390af9a9ceafd07e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000500), 0x0, 0x100, 0x60000000}, 0x40) [ 1536.436653][ T4264] IPVS: ftp: loaded support on port[0] = 21 [ 1536.483676][ T7] tipc: TX() has been purged, node left! [ 1536.489831][ T7] tipc: TX() has been purged, node left! [ 1536.497831][ T7] tipc: TX() has been purged, node left! [ 1536.512236][ T7] tipc: TX() has been purged, node left! [ 1536.518295][ T7] tipc: TX() has been purged, node left! [ 1536.532234][ T7] tipc: TX() has been purged, node left! [ 1536.539245][ T4264] chnl_net:caif_netlink_parms(): no params data found [ 1536.568614][ T4264] bridge0: port 1(bridge_slave_0) entered blocking state [ 1536.575833][ T4264] bridge0: port 1(bridge_slave_0) entered disabled state [ 1536.583743][ T4264] device bridge_slave_0 entered promiscuous mode [ 1536.593108][ T4264] bridge0: port 2(bridge_slave_1) entered blocking state [ 1536.600467][ T4264] bridge0: port 2(bridge_slave_1) entered disabled state [ 1536.608444][ T4264] device bridge_slave_1 entered promiscuous mode [ 1536.628952][ T4264] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1536.640350][ T4264] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1536.661465][ T4264] team0: Port device team_slave_0 added [ 1536.671078][ T4264] team0: Port device team_slave_1 added [ 1536.726550][ T4264] device hsr_slave_0 entered promiscuous mode [ 1536.763999][ T4264] device hsr_slave_1 entered promiscuous mode [ 1536.803536][ T4264] debugfs: Directory 'hsr0' with parent '/' already present! [ 1537.322788][ T4264] bridge0: port 2(bridge_slave_1) entered blocking state [ 1537.333033][ T4264] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1537.340380][ T4264] bridge0: port 1(bridge_slave_0) entered blocking state [ 1537.347702][ T4264] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1537.391356][ T4264] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1537.405721][ T8244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1537.417455][ T8244] bridge0: port 1(bridge_slave_0) entered disabled state [ 1537.425960][ T8244] bridge0: port 2(bridge_slave_1) entered disabled state [ 1537.435266][ T8244] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1537.453793][ T4264] 8021q: adding VLAN 0 to HW filter on device team0 [ 1537.470701][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1537.484941][T24912] bridge0: port 1(bridge_slave_0) entered blocking state [ 1537.492108][T24912] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1537.503273][ T8244] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1537.512530][ T8244] bridge0: port 2(bridge_slave_1) entered blocking state [ 1537.519662][ T8244] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1537.533746][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1537.542565][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1537.570275][ T4264] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1537.584192][ T4264] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1537.596549][T29506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1537.608655][T29506] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1537.617482][T29506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1537.627090][T29506] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1537.636041][T29506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1537.644836][T29506] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1537.653885][T29506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1537.662438][T29506] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1537.671564][T29506] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1537.679715][T29506] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1537.700206][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1537.708026][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1537.720481][ T4264] 8021q: adding VLAN 0 to HW filter on device batadv0 03:17:22 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:17:22 executing program 3: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, 0x0, 0x0) 03:17:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x102, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630a77fbac14140ce0", 0x0, 0x9}, 0x28) openat$tun(0xffffffffffffff9c, 0x0, 0x181c00, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:17:22 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0b") 03:17:22 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000500), 0x0, 0x100, 0x60000000}, 0x40) 03:17:22 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x14}, 0x14}}, 0x0) 03:17:22 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0b") 03:17:22 executing program 3: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, 0x0, 0x0) 03:17:22 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x21, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0", 0x0, 0x100, 0x60000000}, 0x40) 03:17:22 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xb, 0x6, 0x209e20, 0x2, 0x1}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000440), 0x0}, 0x20) 03:17:22 executing program 3: connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) 03:17:22 executing program 3: connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) 03:17:23 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:17:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001340)=[{&(0x7f00000010c0)=""/246, 0xf6}, {0x0}, {0x0}], 0x3) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xa1720495f3f7edd, 0x0, 0x0, 0x800e00516) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x50, &(0x7f0000000040)={0x0, {{0x10, 0x2}}}, 0x90) recvfrom$inet(r2, 0x0, 0x893f, 0x0, 0x0, 0x800e00519) shutdown(r1, 0x0) shutdown(r2, 0x0) 03:17:23 executing program 3: connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) 03:17:23 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x21, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0", 0x0, 0x100, 0x60000000}, 0x40) 03:17:23 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b") 03:17:23 executing program 0: prlimit64(0x0, 0xe, &(0x7f00000002c0)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x120782925520ed0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) recvmmsg(r3, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) 03:17:23 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:17:23 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x21, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0", 0x0, 0x100, 0x60000000}, 0x40) 03:17:23 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b") 03:17:23 executing program 3: r0 = socket$inet(0x2b, 0x0, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, 0x0, 0x0) 03:17:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000640)={"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"}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x7) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:17:23 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x32, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2", 0x0, 0x100, 0x60000000}, 0x40) 03:17:23 executing program 0: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r1, r0, 0xfffffffffffffffd, 0x0) 03:17:23 executing program 3: r0 = socket$inet(0x2b, 0x0, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, 0x0, 0x0) 03:17:23 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b") 03:17:24 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x32, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2", 0x0, 0x100, 0x60000000}, 0x40) 03:17:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) close(r1) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) socket$kcm(0x10, 0x2, 0x4) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000280)=0x1) recvmsg(r1, &(0x7f0000000140)={0x0, 0x100000039, &(0x7f0000000000)=[{&(0x7f0000000380)=""/110, 0xffffffd9}], 0x1, 0x0, 0x4a}, 0x2f04) 03:17:24 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x135}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1539.575592][ T4775] ptrace attach of "/root/syz-executor.0"[4774] was attempted by "/root/syz-executor.0"[4775] [ 1541.259789][ T4988] IPVS: ftp: loaded support on port[0] = 21 [ 1541.345649][ T4988] chnl_net:caif_netlink_parms(): no params data found [ 1541.377357][ T4988] bridge0: port 1(bridge_slave_0) entered blocking state [ 1541.385382][ T4988] bridge0: port 1(bridge_slave_0) entered disabled state [ 1541.393132][ T4988] device bridge_slave_0 entered promiscuous mode [ 1541.669805][ T4988] bridge0: port 2(bridge_slave_1) entered blocking state [ 1541.681562][ T4988] bridge0: port 2(bridge_slave_1) entered disabled state [ 1541.691378][ T4988] device bridge_slave_1 entered promiscuous mode [ 1541.713184][ T4988] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1541.725860][ T4988] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1541.749161][ T4988] team0: Port device team_slave_0 added [ 1541.756795][ T4988] team0: Port device team_slave_1 added [ 1541.816561][ T4988] device hsr_slave_0 entered promiscuous mode [ 1541.853994][ T4988] device hsr_slave_1 entered promiscuous mode [ 1541.893589][ T4988] debugfs: Directory 'hsr0' with parent '/' already present! [ 1541.911494][ T4988] bridge0: port 2(bridge_slave_1) entered blocking state [ 1541.918604][ T4988] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1541.926074][ T4988] bridge0: port 1(bridge_slave_0) entered blocking state [ 1541.933114][ T4988] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1541.971949][ T4988] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1541.986148][ T8237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1542.002476][ T8237] bridge0: port 1(bridge_slave_0) entered disabled state [ 1542.010992][ T8237] bridge0: port 2(bridge_slave_1) entered disabled state [ 1542.021099][ T8237] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1542.034303][ T4988] 8021q: adding VLAN 0 to HW filter on device team0 [ 1542.050733][T29506] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1542.059241][T29506] bridge0: port 1(bridge_slave_0) entered blocking state [ 1542.066425][T29506] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1542.082356][ T8237] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1542.090976][ T8237] bridge0: port 2(bridge_slave_1) entered blocking state [ 1542.098062][ T8237] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1542.119202][T29506] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1542.128142][T29506] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1542.139539][ T8237] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1542.157514][ T4988] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1542.168998][ T4988] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1542.181621][T15394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1542.190638][T15394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1542.199671][T15394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1542.222367][T29506] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1542.233042][T29506] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1542.252560][ T4988] 8021q: adding VLAN 0 to HW filter on device batadv0 03:17:27 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:17:27 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b30") 03:17:27 executing program 3: r0 = socket$inet(0x2b, 0x0, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, 0x0, 0x0) 03:17:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) ptrace(0x4200, 0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x1) open(0x0, 0x0, 0x0) ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0x663abba741622feb) ioctl$KVM_NMI(r2, 0xae9a) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x22000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:17:27 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x32, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2", 0x0, 0x100, 0x60000000}, 0x40) 03:17:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) close(r1) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) socket$kcm(0x10, 0x2, 0x4) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000280)=0x1) recvmsg(r1, &(0x7f0000000140)={0x0, 0x100000039, &(0x7f0000000000)=[{&(0x7f0000000380)=""/110, 0xffffffd9}], 0x1, 0x0, 0x4a}, 0x2f04) 03:17:27 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b30") 03:17:27 executing program 3: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, 0x0, 0x0) 03:17:27 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x3a, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a3901010803", 0x0, 0x100, 0x60000000}, 0x40) 03:17:27 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f0000000180), 0x4) 03:17:27 executing program 3: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, 0x0, 0x0) 03:17:27 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x4000000000802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, 0x0) [ 1542.819528][ T5232] input: syz1 as /devices/virtual/input/input7 03:17:28 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:17:28 executing program 3: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, 0x0, 0x0) 03:17:28 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x400, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000200)={0x10000}, 0xc) connect$inet6(0xffffffffffffffff, 0x0, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x51ea809d148a581a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x1) socket(0x0, 0x803, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000dc0)=[{0x0}, {&(0x7f0000000c80)="3a1d5018ff082e9b04714072445ce063521de85b95643dc07cb189c9d7c7c9782f3b88e8ba17a586e8bd3a983fb4c710060b06e61f65d8ec7ff9d0bf5ffb628db8cd81b3d02d728f2ea4cd957012cf36fe3628e793b3188e0cb9025177d921e94004370380d95d2ffe5ddd596c12f145d77288601b697cb3bee7dbd3f2e4318284601535a5096dbc00357d2406043311e1ca3a9ef561d17e2c71aa83d3", 0x9d}, {0x0}], 0x3, 0x81808) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) write(0xffffffffffffffff, &(0x7f0000cc2fed)="130000003e0005ffffe3ffbd000026180a3f02", 0x13) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r1, &(0x7f0000000640)="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", 0x261, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 03:17:28 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10052, r1, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x14, &(0x7f0000000180), 0x8) 03:17:28 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x3a, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a3901010803", 0x0, 0x100, 0x60000000}, 0x40) 03:17:28 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b30") 03:17:28 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x1aa, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_newroute={0x24, 0x18, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@RTA_GATEWAY={0x8, 0x5, @dev}]}, 0x24}}, 0x0) 03:17:28 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x3a, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a3901010803", 0x0, 0x100, 0x60000000}, 0x40) 03:17:28 executing program 3: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, 0x0, 0x0) 03:17:28 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0x663abba741622feb) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:17:28 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:17:28 executing program 3: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, 0x0, 0x0) 03:17:28 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4a9590c35c4a84296697ab4390af9a9ceafd07e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x3e, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da19244", 0x0, 0x100, 0x60000000}, 0x40) 03:17:28 executing program 5: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="7c0000002e00010700"/20, @ANYRES32, @ANYBLOB="000007000000000003000000080001006270660050000200080004000000000004000500400002003c0001fcfffffe03008af4a98fd704b34bf14b726a11becf04000000000400000000000000e62900000000000000001100000000000000000000000000000000000000000003e8a44d00006b8af1fa454921483b79b0ec762852a47e69e60c061f9c871cc395fa86f369a04912c9e69817f049ec6df0e44a2b27bc64af847665f32224e4d778548bc7cba4aad65985da75ad8f3dcb3ee4b78dd97dc5e138da76d28c07639b67c57cc5df12fe95535049"], 0x7c}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x25e, 0x0) 03:17:29 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/\x00~WMz\x0f0\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xe8\xd3\x83dx-c\xb6a(T\xb2\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e\t\x00\x00\x00\x88\xa4H\xce\x98]\x92\agm0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\n\xd8\x1e\xd8\xda2NDcq\xef\x1eu\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xeb\x8e\x14\x03w\xaao\xb3\x17\x00\xf18\xdcM~\b\xd5|(*g\xdeZu\xc5G\x1f\x81\x00\x00\x00\x00\x00\x00\x00\x9bS\x98\x17\xdb\xa7\x7fK\x93\xcf\xe7-\x19\\I\x1f\xb6\'d\xfce\x92\xe0m\xd0\xa7\xf6:\xbb\xd4\xc6\xe3/_\xa1\x9fnM\xc0t\xd8$\xfc|i\x80@\xc7\xe8\xb2q6\xfa\xd5~b\x89B\xb4i\xeeGh\\\x94\"\xbf\xc1\x99*Lv\xa4\xa3\x91&\xd2\x14\x02\xb9g-*\xa0\xf8\x9b\x04,\xa8\x98%-\x1e%\xf8L\x01\xbe\x87\xd4\x8c\x9d\x9c\r9\xfb#\x1d\xd7\xc0\xe6E\x81\x16c\xeaN\xb8\xfb\x06\xd2\x01\a\xc7\x9e\xb1\x85Xu\xc9v\xe5X\xe6\xe3\xf3\x16\xc4\x88\x03%M3\xec=c\x84\xeb\xc2\xb0\x87\xfdb\xa9\xa4\xe6\xd8\xe5\xeaq/\x1e\xbcW\xec+\xa3f\x9a\x91Tr\xe0N\\\xc5\xb8\x91\xbb\xa5a\xc7OzWcr\xdd\xeb2\xa8\xd2=7}\'B\xcb\xcb\x97\xb7\x99\x03\x85z\xb1\xb4\x84\xd8,\xb4{\x80\xec7\x96\f\x03~\x9b\xfa_0\x82\xc4\xaaD\xa2\x8cU\x96\xa66\xa5\xf4\xeb\xc2\xe3=P\xee\xee\xe2o\xa6\xa2\xbf\x9b\xa2\v\xb9\x9ewi\x94\x1a\xf2\x98\x19\x18\xfdR\xed:\x10-\xaeJ\x92{KA\xda|\xabl|\xfe\xaaKK\xb2:', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x801c581f, 0x0) 03:17:29 executing program 3: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, 0x0, 0x0) 03:17:29 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4a9590c35c4a84296697ab4390af9a9ceafd07e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x3e, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da19244", 0x0, 0x100, 0x60000000}, 0x40) 03:17:29 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x800) 03:17:29 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x40, 0x143) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000480)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) r2 = dup2(r0, r1) clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000380)='./file1\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x125d, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:17:29 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000080)={0x0, 0x0, 0x0, [], &(0x7f0000000040)={0x9b0902, 0x10000, [], @p_u16=0x0}}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0x663abba741622feb) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:17:29 executing program 3: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) 03:17:29 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4a9590c35c4a84296697ab4390af9a9ceafd07e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x3e, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da19244", 0x0, 0x100, 0x60000000}, 0x40) [ 1545.915477][ T5824] IPVS: ftp: loaded support on port[0] = 21 [ 1545.984689][ T5824] chnl_net:caif_netlink_parms(): no params data found [ 1546.012299][ T5824] bridge0: port 1(bridge_slave_0) entered blocking state [ 1546.022688][ T5824] bridge0: port 1(bridge_slave_0) entered disabled state [ 1546.030834][ T5824] device bridge_slave_0 entered promiscuous mode [ 1546.039485][ T5824] bridge0: port 2(bridge_slave_1) entered blocking state [ 1546.046780][ T5824] bridge0: port 2(bridge_slave_1) entered disabled state [ 1546.059582][ T5824] device bridge_slave_1 entered promiscuous mode [ 1546.078277][ T5824] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1546.091126][ T5824] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1546.119340][ T5824] team0: Port device team_slave_0 added [ 1546.127030][ T5824] team0: Port device team_slave_1 added [ 1546.459709][ T5824] device hsr_slave_0 entered promiscuous mode [ 1546.503929][ T5824] device hsr_slave_1 entered promiscuous mode [ 1546.563516][ T5824] debugfs: Directory 'hsr0' with parent '/' already present! [ 1546.584099][ T5824] bridge0: port 2(bridge_slave_1) entered blocking state [ 1546.591439][ T5824] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1546.598859][ T5824] bridge0: port 1(bridge_slave_0) entered blocking state [ 1546.606100][ T5824] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1546.653007][ T5824] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1546.676217][ T8244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1546.688748][ T8244] bridge0: port 1(bridge_slave_0) entered disabled state [ 1546.697416][ T8244] bridge0: port 2(bridge_slave_1) entered disabled state [ 1546.706870][ T8244] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1546.720569][ T5824] 8021q: adding VLAN 0 to HW filter on device team0 [ 1546.737905][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1546.747089][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 1546.754194][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1546.777535][T29506] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1546.786514][T29506] bridge0: port 2(bridge_slave_1) entered blocking state [ 1546.793783][T29506] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1546.801945][T29506] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1546.812162][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1546.836624][ T8244] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1546.845942][ T8244] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1546.857852][ T5824] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1546.869971][ T5824] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1546.884591][T29506] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1546.901559][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1546.910921][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1546.922560][ T5824] 8021q: adding VLAN 0 to HW filter on device batadv0 03:17:31 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:17:31 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r0, 0x0, 0x5d, &(0x7f0000000000)="37ce70fb", 0x4) syz_emit_ethernet(0xd0, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}}, @icmp=@parameter_prob={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @empty=0x1000000}}}}}}, 0x0) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000100)=0x1, 0x4) recvfrom$inet(r0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x800e005d7) 03:17:31 executing program 3: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) 03:17:31 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) ioctl$SIOCAX25DELUID(r0, 0x89e2, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) 03:17:31 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, 0x0, &(0x7f00000003c0)="0e", 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) ptrace(0x4200, r3) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) lstat(0x0, 0x0) open(0x0, 0x141046, 0x0) open(&(0x7f0000000440)='./bus\x00', 0x141046, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x800, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0x663abba741622feb) ioctl$KVM_NMI(r2, 0xae9a) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x22000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:17:31 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4a9590c35c4a84296697ab4390af9a9ceafd07e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x40, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da192442518", 0x0, 0x100, 0x60000000}, 0x40) 03:17:31 executing program 3: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) 03:17:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001340)=[{&(0x7f00000010c0)=""/246, 0xf6}, {0x0}, {0x0}, {0x0}], 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xa1720495f3f7edd, 0x0, 0x0, 0x800e00516) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0x893f, 0x0, 0x0, 0x800e00519) shutdown(r1, 0x0) shutdown(r2, 0x0) 03:17:31 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x40, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da192442518", 0x0, 0x100, 0x60000000}, 0x40) 03:17:31 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80000000000003, 0x3) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000000)={'bridge0\x00\x00z\x00\x00\x00\xff\xff\xfd', &(0x7f0000000100)=@ethtool_ringparam={0xd}}) 03:17:32 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:17:32 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f84", 0x9b) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0/file0\x00', &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000100)='./file0\x00', 0x0) 03:17:32 executing program 3: 03:17:32 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x40, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da192442518", 0x0, 0x100, 0x60000000}, 0x40) 03:17:32 executing program 3: mkdir(&(0x7f0000000040)='./control\x00', 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x0) 03:17:32 executing program 0: mkdir(&(0x7f0000000040)='./control\x00', 0x0) chmod(&(0x7f0000000400)='./control\x00', 0x9c32f69e6caa246b) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x0) 03:17:32 executing program 5: sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="0d00000000003639408fa3a3ba27660199159dffcf1e7feef541a3d2ed47be4a5d98d40b25218605ba97f593ecb4fafc822dfc9d35b2783dda1b0816722db3c91e6d5401790c01a40fe1b4be51d2d59c24e07d5f1991a298f71d69f0c8c4435cde565686eb23fe924640f2c3db27c596cb539a0749378e776a557a2c9386e84fe0b7e51226e430cc325358892100faca908bb7d45dabb66c1008613e367307c7b8380b6e3ad7e6f40d98", 0xaa}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) creat(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) 03:17:32 executing program 4: perf_event_open$cgroup(&(0x7f00000006c0)={0x4, 0x70, 0x3, 0x0, 0x80, 0x9, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x1, @perf_config_ext={0x41}, 0x2001, 0x0, 0x0, 0x3, 0xb3bd, 0x0, 0x3}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x8) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='/\x00~WMz\x0f0\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xe8\xd3\x83dx-c\xb6a(T\xb2\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e\t\x00\x00\x00\x88\xa4H\xce\x98]\x92\agm0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\n\xd8\x1e\xd8\xda2NDcq\xef\x1eu\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xeb\x8e\x14\x03w\xaao\xb3\x17\x00\xf18\xdcM~\b\xd5|(*g\xdeZu\xc5G\x1f\x81\x00\x00\x00\x00\x00\x00\x00\x9bS\x98\x17\xdb\xa7\x7fK\x93\xcf\xe7-\x19\\I\x1f\xb6\'d\xfce\x92\xe0m\xd0\xa7\xf6:\xbb\xd4\xc6\xe3/_\xa1\x9fnM\xc0t\xd8$\xfc|i\x80@\xc7\xe8\xb2q6\xfa\xd5~b\x89B\xb4i\xeeGh\\\x94\"\xbf\xc1\x99*Lv\xa4\xa3\x91&\xd2\x14\x02\xb9g-*\xa0\xf8\x9b\x04,\xa8\x98%-\x1e%\xf8L\x01\xbe\x87\xd4\x8c\x9d\x9c\r9\xfb#\x1d\xd7\xc0\xe6E\x81\x16c\xeaN\xb8\xfb\x06\xd2\x01\a\xc7\x9e\xb1\x85Xu\xc9v\xe5X\xe6\xe3\xf3\x16\xc4\x88\x03%M3\xec=c\x84\xeb\xc2\xb0\x87\xfdb\xa9\xa4\xe6\xd8\xe5\xeaq/\x1e\xbcW\xec+\xa3f\x9a\x91Tr\xe0N\\\xc5\xb8\x91\xbb\xa5a\xc7OzWcr\xdd\xeb2\xa8\xd2=7}\'B\xcb\xcb\x97\xb7\x99\x03\x85z\xb1\xb4\x84\xd8,\xb4{\x80\xec7\x96\f\x03~\x9b\xfa_0\x82\xc4\xaaD\xa2\x8cU\x96\xa66\xa5\xf4\xeb\xc2\xe3=P\xee\xee\xe2o\xa6\xa2\xbf\x9b\xa2\v\xb9\x9ewi\x94\x1a\xf2\x98\x19\x18\xfdR\xed:\x10-\xaeJ\x92{KA\xda|\xabl|\xfe\xaaKK\xb2:', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, r1, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r3, 0x0, 0x200002, 0x0) r4 = gettid() sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r5 = socket$kcm(0x11, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socket$kcm(0xa, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100)=r4, 0xfffffffffffffec6) r6 = gettid() perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x4, 0x0, 0x0, 0x8}, r6, 0x0, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000500)={r5, r8}) 03:17:32 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0xd0, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}}, @icmp=@parameter_prob={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @empty=0x1000000}}}}}}, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x5, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x800e005d7) 03:17:32 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 1547.655438][ T6186] ptrace attach of "/root/syz-executor.5"[6184] was attempted by "/root/syz-executor.5"[6186] 03:17:32 executing program 0: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 03:17:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000280)={0x0, 0x0, 0x86}, &(0x7f0000000340)=ANY=[@ANYBLOB="656e633d706b63733120686173683d7368613531322d617678000000000000000000000000000b00000000000000330c000000000000000067d40000"], 0x0, &(0x7f0000000400)=""/134) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) memfd_create(0x0, 0x0) r4 = getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) ptrace(0x4200, r4) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) open(&(0x7f0000000440)='./bus\x00', 0x141046, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x1) open(&(0x7f0000000440)='./bus\x00', 0x141046, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x800, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0x663abba741622feb) ioctl$KVM_NMI(r3, 0xae9a) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x22000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 1547.778576][ T6194] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1547.803762][ T6194] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:17:33 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x1002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000140)=""/232) r1 = memfd_create(&(0x7f0000000280)='^\x00', 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x17642c4) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x0) r2 = dup2(r0, r0) preadv(r2, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/248, 0xf8}], 0x1, 0x0) sendfile(r0, r1, 0x0, 0x20026fc) 03:17:33 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x41, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181a", 0x0, 0x100, 0x60000000}, 0x40) 03:17:33 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:17:33 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0xdf}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0/file0\x00', &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') socket$inet6(0xa, 0x2, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x18) socket$inet_tcp(0x2, 0x1, 0x0) gettid() signalfd4(r1, 0x0, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000140)={'nat\x00'}, 0x0) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) truncate(&(0x7f0000000100)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) 03:17:33 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x41, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181a", 0x0, 0x100, 0x60000000}, 0x40) 03:17:33 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:17:33 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x41, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181a", 0x0, 0x100, 0x60000000}, 0x40) 03:17:33 executing program 3: syz_mount_image$jfs(&(0x7f0000000200)='jfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@discard='discard'}]}) 03:17:33 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x0, 0x60000000}, 0x40) [ 1548.992026][ T6429] JFS: discard option not supported on device 03:17:33 executing program 5: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x11000, 0x0, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1776}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='.+lgroup/\r\x85\xdc\xb0|\x03>@H\x03%\xde\x00\x04\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000540), 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000006c0)=@pppoe={0x18, 0x0, {0x2, @random="1250c8010805", 'ba\xd1\xbcj\x94\x86\xb2\xf8@\x00\x00\x00\x00\x00\t'}}, 0x80, 0x0}, 0x4088) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x20000, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x410, 0x0, 0xffffffff, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x3}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r3, 0xffffffffffffff23, &(0x7f0000000500)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r4}, 0x44) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={r4}, 0xc) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={r4, 0x7fff, 0x8}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000440)={r5, &(0x7f00000002c0)="74411fed71c819ab98dbe0bd72ad9dc50574f1dbffa19448ee8d565b4840d767b4fc4f8b7cbb22ead1e4a9c431ee7a4b0607e5c69e1915dbeb48018364927238ec5998050f3fcaad5014a62202f8d00b8738dd43c251834a5a6a2e7728806ae4287f49e0e7bc3adb3b029fc87fb2febdb55b08b538051c9808545f91dcbd358cac24354b9d24e3d262878e265062ef6f8d90c5aabb7e9c411221b51b4db4d8fa8baf37f79c7697dbb9be0e0ad9618f990860dc3312cde3623d558b50bcf3ab92ee687ac4fd866385fc2666c28b3539cbb4ed7c63a549738080e2d58387dc66014910eed415", &(0x7f00000003c0)=""/104, 0x4}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\xff', 0x1ff) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000140)='./file0\x00'}, 0x10) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000240)=r6) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x20b, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008108040f80ecdb4cb92e0a480e001a000000e8bd6efb120009000e0002000c0000ff050005001204", 0x2e}], 0x1}, 0x0) r7 = gettid() r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(0x0, r7, 0x7, r8, 0x2) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0xba, 0x800, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1000000, 0x0, @perf_bp={&(0x7f0000000180)}, 0x800, 0xaacd, 0x0, 0x0, 0x0, 0x2, 0x20}, r7, 0x8, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x8}, r7, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x11) perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) socket$kcm(0x29, 0x1, 0x0) [ 1549.160442][ T6429] JFS: discard option not supported on device 03:17:35 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0xd0, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}}, @icmp=@parameter_prob={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @empty=0x1000000}}}}}}, 0x0) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000100), 0x4) recvfrom$inet(r0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x800e005d7) 03:17:35 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x1002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000140)=""/232) r1 = memfd_create(&(0x7f0000000280)='^\x00', 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x17642c4) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x0) r2 = dup2(r0, r0) preadv(r2, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/248, 0xf8}], 0x1, 0x0) sendfile(r0, r1, 0x0, 0x20026fc) 03:17:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x0, 0x60000000}, 0x40) 03:17:35 executing program 3: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x11000, 0x0, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1776}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='.+lgroup/\r\x85\xdc\xb0|\x03>@H\x03%\xde\x00\x04\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000006c0)=@pppoe={0x18, 0x0, {0x2, @random="1250c8010805", 'ba\xd1\xbcj\x94\x86\xb2\xf8@\x00\x00\x00\x00\x00\t'}}, 0x80, 0x0}, 0x4088) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'tunl0\x00'}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x20000, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x410, 0x0, 0xffffffff, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x3}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r2, 0xffffffffffffff23, &(0x7f0000000500)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r3}, 0x44) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={r3}, 0xc) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={r3, 0x7fff, 0x8}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000440)={r4, &(0x7f00000002c0)="74411fed71c819ab98dbe0bd72ad9dc50574f1dbffa19448ee8d565b4840d767b4fc4f8b7cbb22ead1e4a9c431ee7a4b0607e5c69e1915dbeb48018364927238ec5998050f3fcaad5014a62202f8d00b8738dd43c251834a5a6a2e7728806ae4287f49e0e7bc3adb3b029fc87fb2febdb55b08b538051c9808545f91dcbd358cac24354b9d24e3d262878e265062ef6f8d90c5aabb7e9c411221b51b4db4d8fa8baf37f79c7697dbb9be0e0ad9618f990860dc3312cde3623d558b50bcf3ab92ee687ac4fd866385fc2666c28b3539cbb4ed7c63a549738080e2d58387dc66014910eed415", &(0x7f00000003c0)=""/104, 0x4}, 0x20) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000140)='./file0\x00'}, 0x10) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000240)=r5) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x20b, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008108040f80ecdb4cb92e0a480e001a000000e8bd6efb120009000e0002000c0000ff050005001204", 0x2e}], 0x1}, 0x0) r6 = gettid() r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(0x0, r6, 0x7, r7, 0x2) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0xba, 0x800, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1000000, 0x0, @perf_bp={&(0x7f0000000180)}, 0x800, 0xaacd, 0x0, 0x0, 0x0, 0x2, 0x20}, r6, 0x8, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x8}, r6, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x11) perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) r8 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open$cgroup(0x0, r8, 0x0, 0xffffffffffffffff, 0x0) 03:17:35 executing program 5: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x11000, 0x0, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1776}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='.+lgroup/\r\x85\xdc\xb0|\x03>@H\x03%\xde\x00\x04\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000540), 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000006c0)=@pppoe={0x18, 0x0, {0x2, @random="1250c8010805", 'ba\xd1\xbcj\x94\x86\xb2\xf8@\x00\x00\x00\x00\x00\t'}}, 0x80, 0x0}, 0x4088) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x20000, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x410, 0x0, 0xffffffff, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x3}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r3, 0xffffffffffffff23, &(0x7f0000000500)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r4}, 0x44) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={r4}, 0xc) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={r4, 0x7fff, 0x8}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000440)={r5, &(0x7f00000002c0)="74411fed71c819ab98dbe0bd72ad9dc50574f1dbffa19448ee8d565b4840d767b4fc4f8b7cbb22ead1e4a9c431ee7a4b0607e5c69e1915dbeb48018364927238ec5998050f3fcaad5014a62202f8d00b8738dd43c251834a5a6a2e7728806ae4287f49e0e7bc3adb3b029fc87fb2febdb55b08b538051c9808545f91dcbd358cac24354b9d24e3d262878e265062ef6f8d90c5aabb7e9c411221b51b4db4d8fa8baf37f79c7697dbb9be0e0ad9618f990860dc3312cde3623d558b50bcf3ab92ee687ac4fd866385fc2666c28b3539cbb4ed7c63a549738080e2d58387dc66014910eed415", &(0x7f00000003c0)=""/104, 0x4}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\xff', 0x1ff) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000140)='./file0\x00'}, 0x10) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000240)=r6) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x20b, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008108040f80ecdb4cb92e0a480e001a000000e8bd6efb120009000e0002000c0000ff050005001204", 0x2e}], 0x1}, 0x0) r7 = gettid() r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(0x0, r7, 0x7, r8, 0x2) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0xba, 0x800, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1000000, 0x0, @perf_bp={&(0x7f0000000180)}, 0x800, 0xaacd, 0x0, 0x0, 0x0, 0x2, 0x20}, r7, 0x8, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x8}, r7, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x11) perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) socket$kcm(0x29, 0x1, 0x0) 03:17:35 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) lstat(0x0, 0x0) open(0x0, 0x141046, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0x663abba741622feb) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x22000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:17:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) r0 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xff) open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl(0xffffffffffffffff, 0x0, 0x0) sigaltstack(&(0x7f0000001000/0x2000)=nil, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() pipe(&(0x7f0000000200)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) iopl(0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) sched_setattr(0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1551.401002][ T6687] IPVS: ftp: loaded support on port[0] = 21 [ 1551.667264][ T6687] chnl_net:caif_netlink_parms(): no params data found [ 1551.716630][ T6687] bridge0: port 1(bridge_slave_0) entered blocking state [ 1551.724060][ T6687] bridge0: port 1(bridge_slave_0) entered disabled state [ 1551.732119][ T6687] device bridge_slave_0 entered promiscuous mode [ 1551.752895][ T6687] bridge0: port 2(bridge_slave_1) entered blocking state [ 1551.761496][ T6687] bridge0: port 2(bridge_slave_1) entered disabled state [ 1551.769360][ T6687] device bridge_slave_1 entered promiscuous mode [ 1551.793694][ T6687] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1551.806369][ T6687] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1551.825913][ T6687] team0: Port device team_slave_0 added [ 1551.833301][ T6687] team0: Port device team_slave_1 added [ 1551.876547][ T6687] device hsr_slave_0 entered promiscuous mode [ 1551.913857][ T6687] device hsr_slave_1 entered promiscuous mode [ 1551.953992][ T6687] debugfs: Directory 'hsr0' with parent '/' already present! [ 1552.002351][ T6687] bridge0: port 2(bridge_slave_1) entered blocking state [ 1552.009480][ T6687] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1552.017120][ T6687] bridge0: port 1(bridge_slave_0) entered blocking state [ 1552.024394][ T6687] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1552.070235][ T6687] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1552.084140][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1552.092371][T24912] bridge0: port 1(bridge_slave_0) entered disabled state [ 1552.104898][T24912] bridge0: port 2(bridge_slave_1) entered disabled state [ 1552.116833][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1552.130218][ T6687] 8021q: adding VLAN 0 to HW filter on device team0 [ 1552.146597][ T8237] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1552.155275][ T8237] bridge0: port 1(bridge_slave_0) entered blocking state [ 1552.163242][ T8237] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1552.178010][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1552.187481][T24912] bridge0: port 2(bridge_slave_1) entered blocking state [ 1552.195246][T24912] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1552.215134][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1552.234594][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1552.243022][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1552.252843][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1552.262065][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1552.273145][ T6687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1552.292527][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1552.300548][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1552.316333][ T6687] 8021q: adding VLAN 0 to HW filter on device batadv0 03:17:37 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:17:37 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x0, 0x60000000}, 0x40) 03:17:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001340)=[{&(0x7f00000010c0)=""/246, 0xf6}, {0x0}], 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xa1720495f3f7edd, 0x0, 0x0, 0x800e00516) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x50, &(0x7f0000000040)={0x0, {{0x10, 0x2}}}, 0x90) recvfrom$inet(r2, 0x0, 0x893f, 0x0, 0x0, 0x800e00519) shutdown(r1, 0x0) shutdown(r2, 0x0) 03:17:37 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) ioctl$SIOCAX25DELUID(r0, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) 03:17:37 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) r0 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xff) open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl(0xffffffffffffffff, 0x0, 0x0) sigaltstack(&(0x7f0000001000/0x2000)=nil, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() pipe(&(0x7f0000000200)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) iopl(0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) sched_setattr(0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) 03:17:37 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x1002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000140)=""/232) r1 = memfd_create(&(0x7f0000000280)='^\x00', 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x17642c4) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x0) r2 = dup2(r0, r0) preadv(r2, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/248, 0xf8}], 0x1, 0x0) sendfile(r0, r1, 0x0, 0x20026fc) 03:17:37 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) ioctl$SIOCAX25DELUID(r0, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) 03:17:37 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0x0, 0x0}, 0x40) [ 1552.545903][ T7] device bridge_slave_1 left promiscuous mode [ 1552.552129][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1552.636387][ T7] device bridge_slave_0 left promiscuous mode [ 1552.650305][ T7] bridge0: port 1(bridge_slave_0) entered disabled state 03:17:37 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000280)="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", 0xcfa}], 0x1}, 0x0) 03:17:37 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:17:37 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) ioctl$SIOCAX25DELUID(r0, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) [ 1552.749095][ T7] device bridge_slave_1 left promiscuous mode [ 1552.786358][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1552.855218][ T7] device bridge_slave_0 left promiscuous mode [ 1552.861455][ T7] bridge0: port 1(bridge_slave_0) entered disabled state 03:17:37 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) ioctl$SIOCAX25DELUID(r0, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) [ 1552.987866][ T7] device bridge_slave_1 left promiscuous mode [ 1553.025811][ T7] bridge0: port 2(bridge_slave_1) entered disabled state 03:17:37 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:17:37 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) ioctl$SIOCAX25DELUID(r0, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) [ 1553.060064][ T7] device bridge_slave_0 left promiscuous mode [ 1553.123974][ T7] bridge0: port 1(bridge_slave_0) entered disabled state 03:17:37 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) ioctl$SIOCAX25DELUID(r0, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) [ 1553.176900][ T7] device bridge_slave_1 left promiscuous mode [ 1553.183106][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1553.265921][ T7] device bridge_slave_0 left promiscuous mode [ 1553.276111][ T7] bridge0: port 1(bridge_slave_0) entered disabled state 03:17:37 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) [ 1561.503968][ T7] device hsr_slave_0 left promiscuous mode [ 1561.553513][ T7] device hsr_slave_1 left promiscuous mode [ 1561.602443][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1561.618613][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1561.631673][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1561.690607][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1561.830486][ T7] bond0 (unregistering): Released all slaves [ 1562.024110][ T7] device hsr_slave_0 left promiscuous mode [ 1562.063555][ T7] device hsr_slave_1 left promiscuous mode [ 1562.118567][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1562.131290][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1562.144408][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1562.190863][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1562.282019][ T7] bond0 (unregistering): Released all slaves [ 1562.494133][ T7] device hsr_slave_0 left promiscuous mode [ 1562.543733][ T7] device hsr_slave_1 left promiscuous mode [ 1562.598878][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1562.611772][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1562.624974][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1562.673567][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1562.792240][ T7] bond0 (unregistering): Released all slaves [ 1562.974287][ T7] device hsr_slave_0 left promiscuous mode [ 1563.013653][ T7] device hsr_slave_1 left promiscuous mode [ 1563.089027][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1563.107590][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1563.119618][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1563.178586][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1563.318870][ T7] bond0 (unregistering): Released all slaves [ 1563.480300][ T6977] IPVS: ftp: loaded support on port[0] = 21 [ 1563.600382][ T6977] chnl_net:caif_netlink_parms(): no params data found [ 1563.639686][ T6977] bridge0: port 1(bridge_slave_0) entered blocking state [ 1563.648491][ T6977] bridge0: port 1(bridge_slave_0) entered disabled state [ 1563.659753][ T6977] device bridge_slave_0 entered promiscuous mode [ 1563.672085][ T6977] bridge0: port 2(bridge_slave_1) entered blocking state [ 1563.680059][ T6977] bridge0: port 2(bridge_slave_1) entered disabled state [ 1563.689209][ T6977] device bridge_slave_1 entered promiscuous mode [ 1563.721704][ T6977] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1563.735419][ T6977] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1563.770979][ T6977] team0: Port device team_slave_0 added [ 1563.779190][ T6977] team0: Port device team_slave_1 added [ 1563.836742][ T6977] device hsr_slave_0 entered promiscuous mode [ 1563.903985][ T6977] device hsr_slave_1 entered promiscuous mode [ 1563.963748][ T6977] debugfs: Directory 'hsr0' with parent '/' already present! [ 1563.984981][ T6977] bridge0: port 2(bridge_slave_1) entered blocking state [ 1563.994489][ T6977] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1564.001768][ T6977] bridge0: port 1(bridge_slave_0) entered blocking state [ 1564.008882][ T6977] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1564.051232][ T6977] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1564.076689][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1564.085750][T24912] bridge0: port 1(bridge_slave_0) entered disabled state [ 1564.098732][T24912] bridge0: port 2(bridge_slave_1) entered disabled state [ 1564.113915][ T6977] 8021q: adding VLAN 0 to HW filter on device team0 [ 1564.125136][ T8237] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1564.141031][ T8237] bridge0: port 1(bridge_slave_0) entered blocking state [ 1564.148119][ T8237] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1564.176318][ T8237] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1564.186231][ T8237] bridge0: port 2(bridge_slave_1) entered blocking state [ 1564.193367][ T8237] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1564.202770][ T8237] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1564.216499][ T8237] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1564.225198][ T8237] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1564.238688][ T6977] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1564.251275][ T6977] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1564.260247][T15394] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1564.274967][T15394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1564.294108][ T8237] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1564.301571][ T8237] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1564.316089][ T6977] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1567.114726][ T6990] bridge0: port 2(bridge_slave_1) entered disabled state [ 1567.115067][ T6990] bridge0: port 1(bridge_slave_0) entered disabled state 03:17:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001340)=[{&(0x7f00000010c0)=""/246, 0xf6}, {0x0}, {0x0}, {0x0}], 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xa1720495f3f7edd, 0x0, 0x0, 0x800e00516) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r2, 0xffff, 0x1006, &(0x7f0000000000)={0x9}, 0x10) shutdown(0xffffffffffffffff, 0x0) recvfrom$inet(r2, 0x0, 0x893f, 0x0, 0x0, 0x800e00519) shutdown(r1, 0x0) shutdown(r2, 0x0) 03:17:55 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:17:55 executing program 5: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) unshare(0x40000000) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f00000002c0)={'filter\x00', 0x4, [{}, {}, {}, {}]}, 0x68) 03:17:55 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) ioctl$SIOCAX25DELUID(r0, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) 03:17:55 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4a9590c35c4a84296697ab4390af9a9ceafd07e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0x0, 0x0}, 0x40) 03:17:55 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_team\x00', 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) [ 1570.836338][ T7000] IPVS: ftp: loaded support on port[0] = 21 03:17:55 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) socket(0x10, 0x2, 0x0) setreuid(0x0, 0x0) ioctl$SIOCAX25DELUID(r0, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) 03:17:55 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0x0, 0x0}, 0x40) 03:17:55 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:17:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r0 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 03:17:55 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) socket(0x10, 0x2, 0x0) setreuid(0x0, 0x0) ioctl$SIOCAX25DELUID(r0, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) 03:17:55 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4a9590c35c4a84296697ab4390af9a9ceafd07e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) [ 1571.112379][ T7006] IPVS: ftp: loaded support on port[0] = 21 03:17:55 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:17:56 executing program 0: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB='#! ./file0 @'], 0xc) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(0xffffffffffffffff, 0x80044d18, &(0x7f0000000240)) write$tun(0xffffffffffffffff, &(0x7f0000000040)={@void, @val={0x2, 0x6, 0x2, 0x1, 0x0, 0x8000}, @eth={@local, @remote, [{[{0x9100, 0x0, 0x1, 0x4}], {0x8100, 0x4, 0x1, 0x2}}], {@x25={0x805, {0x3, 0x0, 0x27, "caf40c006aa11d11d879443a8e7f4427594fbe592c8a6c9ae072a432ec4aad78785b0c2910f663923947302cb09f1cd1919e56d2314ad006dccd8300c09d4a9ba02f5cb0e52dbe7ef46b9d94e2a6f1dcb3090aaeba6c180e809bc2261b7315b59dcfb4236f6c77fd"}}}}}, 0x8b) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @broadcast}, &(0x7f0000000200)=0x10) 03:17:59 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/\x00~WMz\x0f0\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xe8\xd3\x83dx-c\xb6a(T\xb2\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e\t\x00\x00\x00\x88\xa4H\xce\x98]\x92\agm0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\n\xd8\x1e\xd8\xda2NDcq\xef\x1eu\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xeb\x8e\x14\x03w\xaao\xb3\x17\x00\xf18\xdcM~\b\xd5|(*g\xdeZu\xc5G\x1f\x81\x00\x00\x00\x00\x00\x00\x00\x9bS\x98\x17\xdb\xa7\x7fK\x93\xcf\xe7-\x19\\I\x1f\xb6\'d\xfce\x92\xe0m\xd0\xa7\xf6:\xbb\xd4\xc6\xe3/_\xa1\x9fnM\xc0t\xd8$\xfc|i\x80@\xc7\xe8\xb2q6\xfa\xd5~b\x89B\xb4i\xeeGh\\\x94\"\xbf\xc1\x99*Lv\xa4\xa3\x91&\xd2\x14\x02\xb9g-*\xa0\xf8\x9b\x04,\xa8\x98%-\x1e%\xf8L\x01\xbe\x87\xd4\x8c\x9d\x9c\r9\xfb#\x1d\xd7\xc0\xe6E\x81\x16c\xeaN\xb8\xfb\x06\xd2\x01\a\xc7\x9e\xb1\x85Xu\xc9v\xe5X\xe6\xe3\xf3\x16\xc4\x88\x03%M3\xec=c\x84\xeb\xc2\xb0\x87\xfdb\xa9\xa4\xe6\xd8\xe5\xeaq/\x1e\xbcW\xec+\xa3f\x9a\x91Tr\xe0N\\\xc5\xb8\x91\xbb\xa5a\xc7OzWcr\xdd\xeb2\xa8\xd2=7}\'B\xcb\xcb\x97\xb7\x99\x03\x85z\xb1\xb4\x84\xd8,\xb4{\x80\xec7\x96\f\x03~\x9b\xfa_0\x82\xc4\xaaD\xa2\x8cU\x96\xa66\xa5\xf4\xeb\xc2\xe3=P\xee\xee\xe2o\xa6\xa2\xbf\x9b\xa2\v\xb9\x9ewi\x94\x1a\xf2\x98\x19\x18\xfdR\xed:\x10-\xaeJ\x92{KA\xda|\xabl|\xfe\xaaKK\xb2:', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x80086601, 0x0) 03:17:59 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) socket(0x10, 0x2, 0x0) setreuid(0x0, 0x0) ioctl$SIOCAX25DELUID(r0, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) 03:17:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 03:17:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000000140)="1400000013000507ed0a64d24ef862450f58c653", 0x14}], 0x1, 0x0, 0x0, 0x300}, 0x0) 03:17:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001340)=[{&(0x7f00000010c0)=""/246, 0xf6}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xa1720495f3f7edd, 0x0, 0x0, 0x800e00516) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r2, 0xffff, 0x1006, &(0x7f0000000000)={0x9}, 0x10) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0x893f, 0x0, 0x0, 0x800e00519) shutdown(r1, 0x0) shutdown(r2, 0x0) 03:17:59 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:17:59 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) ioctl$SIOCAX25DELUID(r0, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) 03:17:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 03:17:59 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$SIOCAX25DELUID(r0, 0x8912, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) 03:17:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000000140)="1400000013000507ed0a64d24ef862450f58c653", 0x14}], 0x1, 0x0, 0x0, 0x300}, 0x0) 03:17:59 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000280)={0x0, 0x1, 0x86}, &(0x7f0000000340)=ANY=[@ANYBLOB], &(0x7f00000003c0)="0e", &(0x7f0000000400)=""/134) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) memfd_create(0x0, 0x0) r4 = getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) ptrace(0x4200, r4) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000440)='./bus\x00', 0x141046, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x1) open(&(0x7f0000000440)='./bus\x00', 0x141046, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x800, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0x663abba741622feb) ioctl$KVM_NMI(r3, 0xae9a) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x22000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:17:59 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) ioctl$SIOCAX25DELUID(r0, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) 03:17:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001340)=[{&(0x7f00000010c0)=""/246, 0xf6}, {0x0}, {0x0}, {0x0}], 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xa1720495f3f7edd, 0x0, 0x0, 0x800e00516) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r2, 0xffff, 0x1006, &(0x7f0000000000)={0x9}, 0x10) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0x893f, 0x0, 0x0, 0x800e00519) shutdown(r1, 0x0) shutdown(r2, 0x0) 03:17:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001340)=[{&(0x7f00000010c0)=""/246, 0xf6}, {0x0}, {0x0}, {0x0}], 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xa1720495f3f7edd, 0x0, 0x0, 0x800e00516) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) shutdown(0xffffffffffffffff, 0x0) recvfrom$inet(r2, 0x0, 0x893f, 0x0, 0x0, 0x800e00519) shutdown(r1, 0x0) shutdown(r2, 0x0) 03:17:59 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) ioctl$SIOCAX25DELUID(r0, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) 03:17:59 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000240), 0x4) [ 1576.715532][ T7682] IPVS: ftp: loaded support on port[0] = 21 [ 1576.782270][ T7682] chnl_net:caif_netlink_parms(): no params data found [ 1576.818685][ T7682] bridge0: port 1(bridge_slave_0) entered blocking state [ 1576.825983][ T7682] bridge0: port 1(bridge_slave_0) entered disabled state [ 1576.834395][ T7682] device bridge_slave_0 entered promiscuous mode [ 1576.842445][ T7682] bridge0: port 2(bridge_slave_1) entered blocking state [ 1576.849999][ T7682] bridge0: port 2(bridge_slave_1) entered disabled state [ 1576.858418][ T7682] device bridge_slave_1 entered promiscuous mode [ 1576.877442][ T7682] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1576.888822][ T7682] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1576.912422][ T7682] team0: Port device team_slave_0 added [ 1576.921621][ T7682] team0: Port device team_slave_1 added [ 1576.966661][ T7682] device hsr_slave_0 entered promiscuous mode [ 1576.999167][ T7682] device hsr_slave_1 entered promiscuous mode [ 1577.053705][ T7682] debugfs: Directory 'hsr0' with parent '/' already present! [ 1577.073999][ T7682] bridge0: port 2(bridge_slave_1) entered blocking state [ 1577.081172][ T7682] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1577.088879][ T7682] bridge0: port 1(bridge_slave_0) entered blocking state [ 1577.095988][ T7682] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1577.140108][ T7682] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1577.155800][T28297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1577.166812][T28297] bridge0: port 1(bridge_slave_0) entered disabled state [ 1577.178534][T28297] bridge0: port 2(bridge_slave_1) entered disabled state [ 1577.188983][T28297] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1577.217433][ T7682] 8021q: adding VLAN 0 to HW filter on device team0 [ 1577.236199][T28297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1577.254610][T28297] bridge0: port 1(bridge_slave_0) entered blocking state [ 1577.261710][T28297] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1577.287291][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1577.296341][T24912] bridge0: port 2(bridge_slave_1) entered blocking state [ 1577.303679][T24912] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1577.330789][ T7685] IPVS: ftp: loaded support on port[0] = 21 [ 1577.338399][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1577.348503][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1577.366713][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1577.377970][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1577.393041][ T7682] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1577.405643][ T7682] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1577.418991][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1577.448451][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1577.457388][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1577.481645][ T7682] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1577.546263][ T7685] chnl_net:caif_netlink_parms(): no params data found [ 1577.587048][ T7685] bridge0: port 1(bridge_slave_0) entered blocking state [ 1577.595192][ T7685] bridge0: port 1(bridge_slave_0) entered disabled state [ 1577.605111][ T7685] device bridge_slave_0 entered promiscuous mode [ 1577.614860][ T7685] bridge0: port 2(bridge_slave_1) entered blocking state [ 1577.622717][ T7685] bridge0: port 2(bridge_slave_1) entered disabled state [ 1577.632246][ T7685] device bridge_slave_1 entered promiscuous mode [ 1577.655785][ T7685] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1577.671946][ T7685] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1577.721412][ T7685] team0: Port device team_slave_0 added [ 1577.751415][ T7685] team0: Port device team_slave_1 added [ 1577.837040][ T7685] device hsr_slave_0 entered promiscuous mode [ 1577.884422][ T7685] device hsr_slave_1 entered promiscuous mode [ 1577.923786][ T7685] debugfs: Directory 'hsr0' with parent '/' already present! [ 1578.153095][ T7685] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1578.170872][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1578.189818][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1578.207210][ T7685] 8021q: adding VLAN 0 to HW filter on device team0 [ 1578.222355][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1578.236809][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1578.247598][T24912] bridge0: port 1(bridge_slave_0) entered blocking state [ 1578.256358][T24912] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1578.273655][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1578.281525][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1578.290707][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1578.303188][T24912] bridge0: port 2(bridge_slave_1) entered blocking state [ 1578.310306][T24912] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1578.318665][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1578.368013][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1578.378214][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1578.392587][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1578.403594][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1578.412659][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1578.423690][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1578.432017][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1578.444055][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1578.468041][ T4262] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1578.483909][ T4262] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1578.491449][ T4262] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1578.509153][ T7685] 8021q: adding VLAN 0 to HW filter on device batadv0 03:18:03 executing program 0: 03:18:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000010203f20000000000000000000000000800070074000000"], 0x1c}}, 0x0) 03:18:03 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000280)={0x0, 0x1, 0x86}, &(0x7f0000000340)=ANY=[@ANYBLOB='enc=pkcs1 hash=sha512-avx\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x003\f\x00\x00'], &(0x7f00000003c0)="0e", &(0x7f0000000400)=""/134) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) memfd_create(0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) ptrace(0x4200, r3) lstat(0x0, 0x0) open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x1) open(&(0x7f0000000440)='./bus\x00', 0x141046, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0x663abba741622feb) ioctl$KVM_NMI(r2, 0xae9a) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x22000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:18:03 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) ioctl$SIOCAX25DELUID(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) 03:18:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x14, &(0x7f0000000240), 0x4) 03:18:03 executing program 1: ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:03 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) ioctl$SIOCAX25DELUID(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) [ 1578.868106][ T7716] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 03:18:03 executing program 5: 03:18:03 executing program 0: 03:18:03 executing program 2: 03:18:03 executing program 0: 03:18:03 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) ioctl$SIOCAX25DELUID(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) 03:18:03 executing program 4: r0 = socket(0x40000000002, 0x3, 0x2) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) 03:18:03 executing program 5: 03:18:03 executing program 2: 03:18:03 executing program 0: 03:18:03 executing program 4: [ 1580.974572][ T7951] IPVS: ftp: loaded support on port[0] = 21 [ 1581.057714][ T7951] chnl_net:caif_netlink_parms(): no params data found [ 1581.092488][ T7951] bridge0: port 1(bridge_slave_0) entered blocking state [ 1581.100141][ T7951] bridge0: port 1(bridge_slave_0) entered disabled state [ 1581.108750][ T7951] device bridge_slave_0 entered promiscuous mode [ 1581.117377][ T7951] bridge0: port 2(bridge_slave_1) entered blocking state [ 1581.124912][ T7951] bridge0: port 2(bridge_slave_1) entered disabled state [ 1581.132768][ T7951] device bridge_slave_1 entered promiscuous mode [ 1581.158498][ T7951] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1581.169875][ T7951] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1581.203537][ T7951] team0: Port device team_slave_0 added [ 1581.210784][ T7951] team0: Port device team_slave_1 added [ 1581.296440][ T7951] device hsr_slave_0 entered promiscuous mode [ 1581.344032][ T7951] device hsr_slave_1 entered promiscuous mode [ 1581.383558][ T7951] debugfs: Directory 'hsr0' with parent '/' already present! [ 1581.402560][ T7951] bridge0: port 2(bridge_slave_1) entered blocking state [ 1581.410087][ T7951] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1581.417630][ T7951] bridge0: port 1(bridge_slave_0) entered blocking state [ 1581.424805][ T7951] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1581.478344][ T7951] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1581.494966][ T4262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1581.509323][ T4262] bridge0: port 1(bridge_slave_0) entered disabled state [ 1581.518571][ T4262] bridge0: port 2(bridge_slave_1) entered disabled state [ 1581.529791][ T4262] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1581.545765][ T7951] 8021q: adding VLAN 0 to HW filter on device team0 [ 1581.565237][T15394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1581.574174][T15394] bridge0: port 1(bridge_slave_0) entered blocking state [ 1581.581301][T15394] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1581.594242][ T4262] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1581.604667][ T4262] bridge0: port 2(bridge_slave_1) entered blocking state [ 1581.611907][ T4262] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1581.635943][T29506] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1581.654131][T29506] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1581.662432][T29506] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1581.671981][T29506] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1581.681959][T29506] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1581.692896][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1581.717905][ T4262] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1581.725902][ T4262] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1581.746343][ T7951] 8021q: adding VLAN 0 to HW filter on device batadv0 03:18:06 executing program 1: ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:06 executing program 5: 03:18:06 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) ioctl$SIOCAX25DELUID(r0, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) 03:18:06 executing program 2: 03:18:06 executing program 4: 03:18:06 executing program 0: 03:18:06 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) ioctl$SIOCAX25DELUID(r0, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) 03:18:06 executing program 0: 03:18:06 executing program 2: 03:18:06 executing program 4: 03:18:06 executing program 5: 03:18:06 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) ioctl$SIOCAX25DELUID(r0, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) 03:18:07 executing program 1: ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:07 executing program 2: 03:18:07 executing program 0: 03:18:07 executing program 5: 03:18:07 executing program 4: 03:18:07 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) ioctl$SIOCAX25DELUID(r0, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) 03:18:07 executing program 0: 03:18:07 executing program 4: 03:18:07 executing program 2: 03:18:07 executing program 5: 03:18:07 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) ioctl$SIOCAX25DELUID(r0, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) 03:18:07 executing program 5: 03:18:07 executing program 2: 03:18:07 executing program 4: 03:18:07 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:07 executing program 0: 03:18:07 executing program 5: 03:18:07 executing program 4: 03:18:07 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) ioctl$SIOCAX25DELUID(r0, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) 03:18:07 executing program 0: 03:18:07 executing program 2: 03:18:07 executing program 5: 03:18:07 executing program 4: 03:18:07 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0xffffffffa0018000, 0x0, &(0x7f0000000000)={&(0x7f0000000500)={0x2, 0x2, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 03:18:07 executing program 2: 03:18:07 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) ioctl$SIOCAX25DELUID(r0, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) [ 1585.138476][ T8046] IPVS: ftp: loaded support on port[0] = 21 [ 1585.208091][ T8046] chnl_net:caif_netlink_parms(): no params data found [ 1585.237336][ T8046] bridge0: port 1(bridge_slave_0) entered blocking state [ 1585.244736][ T8046] bridge0: port 1(bridge_slave_0) entered disabled state [ 1585.253467][ T8046] device bridge_slave_0 entered promiscuous mode [ 1585.261906][ T8046] bridge0: port 2(bridge_slave_1) entered blocking state [ 1585.269301][ T8046] bridge0: port 2(bridge_slave_1) entered disabled state [ 1585.277235][ T8046] device bridge_slave_1 entered promiscuous mode [ 1585.298824][ T8046] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1585.310860][ T8046] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1585.335024][ T8046] team0: Port device team_slave_0 added [ 1585.344843][ T8046] team0: Port device team_slave_1 added [ 1585.395540][ T8046] device hsr_slave_0 entered promiscuous mode [ 1585.463960][ T8046] device hsr_slave_1 entered promiscuous mode [ 1585.513663][ T8046] debugfs: Directory 'hsr0' with parent '/' already present! [ 1585.535929][ T8046] bridge0: port 2(bridge_slave_1) entered blocking state [ 1585.543505][ T8046] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1585.550904][ T8046] bridge0: port 1(bridge_slave_0) entered blocking state [ 1585.558116][ T8046] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1585.601801][ T8046] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1585.616028][T15394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1585.626568][T15394] bridge0: port 1(bridge_slave_0) entered disabled state [ 1585.634898][T15394] bridge0: port 2(bridge_slave_1) entered disabled state [ 1585.649087][T15394] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1585.663871][ T8046] 8021q: adding VLAN 0 to HW filter on device team0 [ 1585.680412][ T4262] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1585.689533][ T4262] bridge0: port 1(bridge_slave_0) entered blocking state [ 1585.697334][ T4262] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1585.715739][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1585.724314][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 1585.731448][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1585.757055][ T8244] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1585.766591][ T8244] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1585.776482][ T8244] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1585.791237][ T8046] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1585.803288][ T8046] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1585.811843][ T8244] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1585.821533][ T8244] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1585.843640][ T8244] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1585.851337][ T8244] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1585.863854][ T8046] 8021q: adding VLAN 0 to HW filter on device batadv0 03:18:10 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:10 executing program 5: 03:18:10 executing program 4: 03:18:10 executing program 2: 03:18:10 executing program 0: 03:18:10 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) ioctl$SIOCAX25DELUID(r0, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) 03:18:10 executing program 5: 03:18:10 executing program 4: 03:18:10 executing program 0: 03:18:10 executing program 2: 03:18:10 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) ioctl$SIOCAX25DELUID(r0, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) 03:18:10 executing program 5: 03:18:10 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:10 executing program 2: 03:18:10 executing program 0: 03:18:10 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) 03:18:10 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x6, 0x4, 0x200, 0x80000000000004, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000000)='Z', &(0x7f0000000040)}, 0x20) 03:18:11 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) ioctl$SIOCAX25DELUID(r0, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) 03:18:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_gettime(0x3, &(0x7f0000000040)) 03:18:11 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:11 executing program 5: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) getsockname$packet(r5, &(0x7f0000002fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003000)=0x14) 03:18:11 executing program 2: 03:18:11 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) ioctl$SIOCAX25DELUID(r0, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) 03:18:11 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r1, &(0x7f0000000140)='h', 0x1, 0x8800, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) sendto$inet(r1, &(0x7f0000000100)='\x00', 0x1, 0x0, 0x0, 0x0) 03:18:11 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="93"], 0x1) socket(0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000340)=ANY=[@ANYRES64], 0x8) 03:18:11 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00\xdf\xf2\x02x\x1a\x9cu\xa1\x1b\xdaN\x1c\xef\xe9\nJ\x93\xf2\xee\xe8W\xcd\xc4\xadG\x17e\xf1\xd7\xda\xf7\xa1\xcf\x1f\xa4\xd3\xe32\xa0\x8c\xd4\xd0\x9a\xbb\xe15\xf2E`\xc9SX7\x02HG\xbd.p\xf4m\x8a\xd5u\x9c\x8c\xc0\x1b\x11\xd1.C(R\x16B5_\x1cVY,M\x83x\x89\xbe\xfb\xa5\x99\x99s\xea(D\x8d0\xec\x06\x1d\xe4\x9fw\xe7\x06\x11m\xcfL\x10HW\xf3\xf7\xee_\",\a\'\x11;\x85\x8a\x80S\v\x90\xab\x13\xe4\xc93\x96\x16\'\xdc\xecq\xcdQ\x8d\xec\xe0 \x13\xbd\x1a\x1f0\xcf\xe0\n\xeds\x85\xf2\x7f\xf1\xa4\x1fam\xc7\x12\x90\xf1Z\xbf\x15\xf7t+!}B\x15\a\x13\xbf\xa7\x05\xb1M\x89\xd5\xc43\x94\x84,\xeeFw\xc8\xe7\xa9\x9a\xbe\x0f\x80\xb9\xef\xafg2\xd0\x11\x94\b`\x8apREK*\x19zq\xbcRZ\xb2\xfc#*\xdaG5}\xc0y\xb5B\xa1Aa=\xde\xb4W\xdbC\x82f\xbb\xa12\x8b\x96J\xfa.\xf3mekE\xa0\xf2\xcd\x89\xe3\x99\x9c', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r1, 0x11, 0x0, 0x0, &(0x7f0000000100)) 03:18:11 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) 03:18:11 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) ioctl$SIOCAX25DELUID(r0, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) 03:18:11 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:11 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xef, 0x209e21, 0x100008000000001, 0x0, 0xffffffffffffffff, 0x0, [], r1}, 0x3c) 03:18:11 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) recvmmsg(r0, &(0x7f0000000980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8020, 0x0) 03:18:11 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) 03:18:11 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setreuid(0x0, 0x0) ioctl$SIOCAX25DELUID(r0, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) 03:18:11 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000038c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000640)=""/135, 0x87}], 0x1}}], 0x1, 0x0, 0x0) 03:18:11 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:11 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setreuid(0x0, 0x0) ioctl$SIOCAX25DELUID(r0, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) 03:18:12 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 03:18:12 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:12 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) 03:18:12 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setreuid(0x0, 0x0) ioctl$SIOCAX25DELUID(r0, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) 03:18:12 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r2) ioctl$SIOCAX25DELUID(r0, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) 03:18:12 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00\xdf\xf2\x02x\x1a\x9cu\xa1\x1b\xdaN\x1c\xef\xe9\nJ\x93\xf2\xee\xe8W\xcd\xc4\xadG\x17e\xf1\xd7\xda\xf7\xa1\xcf\x1f\xa4\xd3\xe32\xa0\x8c\xd4\xd0\x9a\xbb\xe15\xf2E`\xc9SX7\x02HG\xbd.p\xf4m\x8a\xd5u\x9c\x8c\xc0\x1b\x11\xd1.C(R\x16B5_\x1cVY,M\x83x\x89\xbe\xfb\xa5\x99\x99s\xea(D\x8d0\xec\x06\x1d\xe4\x9fw\xe7\x06\x11m\xcfL\x10HW\xf3\xf7\xee_\",\a\'\x11;\x85\x8a\x80S\v\x90\xab\x13\xe4\xc93\x96\x16\'\xdc\xecq\xcdQ\x8d\xec\xe0 \x13\xbd\x1a\x1f0\xcf\xe0\n\xeds\x85\xf2\x7f\xf1\xa4\x1fam\xc7\x12\x90\xf1Z\xbf\x15\xf7t+!}B\x15\a\x13\xbf\xa7\x05\xb1M\x89\xd5\xc43\x94\x84,\xeeFw\xc8\xe7\xa9\x9a\xbe\x0f\x80\xb9\xef\xafg2\xd0\x11\x94\b`\x8apREK*\x19zq\xbcRZ\xb2\xfc#*\xdaG5}\xc0y\xb5B\xa1Aa=\xde\xb4W\xdbC\x82f\xbb\xa12\x8b\x96J\xfa.\xf3mekE\xa0\xf2\xcd\x89\xe3\x99\x9c', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x0, &(0x7f0000000240), 0x4) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r3, 0x11, 0x65, 0x0, &(0x7f0000000100)) 03:18:12 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) recvmmsg(r0, &(0x7f0000000980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8020, 0x0) 03:18:12 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:12 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r2) ioctl$SIOCAX25DELUID(r0, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) 03:18:12 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000000280)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xf, 0x54, 0x0, 0x0, 0xff9f0000}}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfc76, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffe77}, 0x48) 03:18:12 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:12 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r2) ioctl$SIOCAX25DELUID(r0, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) 03:18:13 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000300)='./bus\x00', 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$cgroup_type(r1, &(0x7f00000000c0)='threaded\x00', 0x8db9) sendfile(r1, r2, 0x0, 0x8000fffffffe) 03:18:13 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:13 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setreuid(0x0, 0x0) ioctl$SIOCAX25DELUID(r0, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) 03:18:13 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:13 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='sysfs\x00\x99o\x19\xf1_\xc2\x0fc6\x9b\x15/ J\xfd\x8c\x94-\x862d\'I\xe7\xa0\xbf\x7f-\x14\xf9\x90\xa7u8J\xe3r\xe0\xa1\x7f\x00\x00\x00\"X8\xd1\x0f\xf1n\x04&\x82\xa9', 0x1000000, 0x0) 03:18:13 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000710fec)={0x40000000002, 0x4, 0x4, 0x46}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005b5fe0)={r0, &(0x7f0000000080), &(0x7f0000000000), 0x1}, 0x20) 03:18:13 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) 03:18:13 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:13 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setreuid(0x0, 0x0) ioctl$SIOCAX25DELUID(r0, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) 03:18:13 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x5) sendmmsg(0xffffffffffffffff, &(0x7f0000008600)=[{{&(0x7f0000000080)=@sco, 0x80, 0x0}}], 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x40004007fff}, 0x14) sendmmsg$inet6(r0, &(0x7f0000007e40)=[{{0x0, 0x256, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000480100df0904000288ed0ae9de0512000000000000000000007624f10b7d0dff16a087db9a32b56fd600aa381f8aaa7af9d6437cf63f0a944009b9d2d0d30df03a11f6dc8dd99a1009607bf74452f0b9f4c319177e0c034e3b13e572c612bcae99c353bfcdabea015c04093d53cab715c0a7495b15a680"], 0xc}}], 0x55f, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") 03:18:13 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:13 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000140)="6812334f6743a747f8bf094356", 0xd, 0x8800, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r1, &(0x7f0000000100)='\x00', 0x38, 0x4088, 0x0, 0x0) recvmmsg(r1, &(0x7f00000038c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000640)=""/135, 0x87}], 0x1}}], 0x1, 0x0, 0x0) 03:18:13 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setreuid(0x0, 0x0) ioctl$SIOCAX25DELUID(r0, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) [ 1588.895384][ T9137] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:18:13 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:13 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:13 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) 03:18:13 executing program 3: syz_init_net_socket$ax25(0x3, 0x3, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) ioctl$SIOCAX25DELUID(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) 03:18:13 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x3, &(0x7f0000000280)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x24, 0xf}}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfc76, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffe77}, 0x48) 03:18:13 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'nr0\x01\x00\x00\x00\xf2\xff\xff\xfe\x00\x00@\x00', 0x6}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) dup3(r1, r0, 0x0) 03:18:13 executing program 3: syz_init_net_socket$ax25(0x3, 0x3, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) ioctl$SIOCAX25DELUID(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) [ 1589.194262][ T9263] syz-executor.5[9263] is installing a program with bpf_probe_write_user helper that may corrupt user memory! 03:18:13 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000700)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, &(0x7f00000005c0)="00abe6d29e6101cb8b41eea5cf2e67fea541e9b7b65fe42e517d5f81d2919e1b2f4cf7f77a16fc3e961a0847916c7c2d9b77cd3160567341263cf19b3b2c6177e7065dda850c756c06aede12e9da8118bb5464ad07fa6146f6903ee57345cbd7551f547bdbe947b4f9a0b28cf29a28eda534fc6e2c9bf2c36c87da9ad79e6e7090", 0xfffffffffffffefd, 0x8c4, 0x0, 0x0) creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) creat(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_open_procfs(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) recvfrom$inet(r0, &(0x7f0000000440)=""/98, 0x203be9be0e639dd, 0x0, 0x0, 0xffffffffffffffd7) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00', 0x101}) read(r0, &(0x7f00000001c0)=""/244, 0xffffff52) [ 1589.194942][ T9263] syz-executor.5[9263] is installing a program with bpf_probe_write_user helper that may corrupt user memory! 03:18:14 executing program 3: syz_init_net_socket$ax25(0x3, 0x3, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) ioctl$SIOCAX25DELUID(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) 03:18:14 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) ioctl$SIOCAX25DELUID(r0, 0x89e1, 0x0) 03:18:14 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) ioctl$SIOCAX25DELUID(r0, 0x89e1, 0x0) 03:18:14 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) ioctl$SIOCAX25DELUID(r0, 0x89e1, 0x0) [ 1589.834303][ T9470] device lo entered promiscuous mode [ 1589.953540][ T9468] device lo left promiscuous mode 03:18:14 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:14 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:14 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000002c0)=0x3) read(r0, &(0x7f0000000040)=""/11, 0xb) r1 = syz_open_pts(r0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x2) 03:18:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) recvmmsg(0xffffffffffffffff, &(0x7f00000005c0)=[{{&(0x7f0000000040)=@ipx, 0x80, &(0x7f0000000440)=[{0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000400)=""/28, 0x1c}], 0x5}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/igmp6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) clone(0x7f8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="4024ccdbf2bc01402720148d0f34"], 0xe}}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 1590.034493][ T9474] device lo entered promiscuous mode 03:18:14 executing program 5: clone(0x20040200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000200)='./file0\x00', 0x27e, 0x0) 03:18:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001a00)={0x124, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@nested={0x110, 0x0, [@generic="236f5c4a97f3dfcf1effe640e1108d665898f69a37f1ecc63dbe2579b03b6cc3f38e8c9f8c6c1a75d7f10a58f97a7f1f17a0ad1023eaab2417082f3d45a7d7c6", @generic="c599565f661969166b351f6a6322a554ccd9278db2ffe15bd632a40460c8c334a8319764d265aa5a72a777df69dd0436d988468aca9a08b9d3a387f55bd4c8fc7d6167bc7b7daa5b5bf5407f7fdc16183bcaca921e9af0f8095a2a3f702c2ab030351f0db5a789e59d5b36b3f3f4f5521de82b2460a92e902ec3963978faff41d6d65d34dcb50d2030840fe7f5a01c485f50f0dd3ce4a1ef05932b369ec40a876f279a6522752753ce64a0b470cfe13e170cf545313739a96a97910ea8c9af6047f1a8c5bf9a4db663ed5a08"]}]}, 0x124}, 0x1, 0x0, 0x0, 0x404c010}, 0x80) [ 1590.127115][ T9494] ptrace attach of "/root/syz-executor.0"[9490] was attempted by "/root/syz-executor.0"[9494] 03:18:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) sendmsg$nl_netfilter(r0, &(0x7f0000000100)={&(0x7f0000000080), 0xc, &(0x7f00000000c0)={&(0x7f0000001a00)={0x98c, 0x0, 0x0, 0x0, 0x0, 0x25dfdbfb, {}, [@generic="d96e66f138d88bdb3c782577eb9506230a7aa6983d9cea988e1f07f46a0943c4a4e789c73d768428560de5337da19cf464a54a4ef0f685bf17e5141bc9fa5e579c0d8d128178dd55048556", @nested={0x8f0, 0x87, [@generic="236f5c4a97f3dfcf1effe640e1108d665898f69a37f1ecc63dbe2579b03b6cc3f38e8c9f8c6c1a75d7f10a58f97a7f1f17a0ad1023eaab2417082f3d45a7d7c65c7722b34405113fce2ea0d4c4f04ca24824efb782", @generic="eede659a3c6158d7ddcaf9519387c50f64759b7d8c8779fe6dbbd3580f9c4fe41f4c1e1f7569edc6b55eaf8e5bdead0271fea5629ee7333cc673ef28400eca2407266ffed6fbab7536d22cee2b411c67b394f1a1d52f020eb6728bcc6907fbd303ef166d74cff7c4ff7bc85dcedc59568c644bc30ea61afcbc1f92aed89dc019e5f6b406178bab78ed857a7ffdd1e0aaf2bdbb8f58eff4f626c7772b5e9665a8a5040c58ac5d6cf2721a2212c38b56cc4a108822afb52743e5659e581a15c2bd171a946cb98b39823fe04542a5cbcc18b6d97a80b13ba64cc9bea16b49e18c28872ecc0ef35fa3cfc458b3feb563793cbdf9a51616d8f47f13d4e59b14", @typed={0x794, 0x21, @binary="a839293514404d86d0b5a7551b72a8ebbf01a3fabc90b16ee92e18ee6f1e7d8ff4eb62dfabda3770f37fc2ae61d0565c4fe9e213f253d8c91ec3d5ea62d230707b3d9b26b28a90de5284c2fb1fb79bc915021b3f08c68b31a1616531f656ccfa6c13972a1d352badc71ff27f4badc38809d904f7a16407f37671cdc303acbec6353b8e25cbb3ab942fa5f7a171b4454f43d8159f3b08a08e4d6fe4eede51f21726fc703f7c38fc1c0ff1d3941fac4ff5bfc4236fce4ec6d9e859d8c232825778bb2bbe1b60c86f942484dec559310abb6ba2e52e2e7a6a1428fc382533f560eb02203bc592b4b66cda960ad5f59c33a62276bf5c5aa7f95d8eb5a1150aa41194c4ecb3ef79907f5a6b2d2185aa083802cb50de2d426dedabf3c327c2782d3634418b4bb482de4066962c147e8dc8399252b2037c741893c3a975bea3f3a3762228689fbc8e730413706b8c938bce1b12fda3c4c9f2c17df08222491aae1e6cfe4351c014e41edd642621743a17916be93e4dd930807c9c4416de8b279fb510e52e5ea6de1f2f1606d5d2470067070d868a6ae3c0bc3086103f89179f19501e235379b29ee5c6d33b9707428776d3adc6e0227ad2a739b479c66b4cc9d49f2c2b0bd800ee39606c61c9e16332ec71f283a26b5cf33a6e7e161e09223afb0c25feb1bebfce5952db1343b92afcbc6d6d5aea43f71123c7906c79fac68ee4dc91d3c26bd5104d38e4ddfe7ebb34404143d59e4b5cda89dfb2f581bffb85265e7807e40a68eb23879f24e49d2ebf5387d500e3a2d23c5c489edab44c9001d8962a966db858a35d46fbd0773905e3b7b687b8e25926a0e4f9ea3b0e2e9e6a6df634c34b26d9d90a40474ea52a78648d57092cffe64c7ca5958dc6923e0fe459942060d5a02d850ab8ec8fc4d98cecf8f51160ce11729931f7f834c9aabcaad2987788c42590964a4d0fd89502853756b41a33256fb8ba6470f7759dfc3938de43ce1ada774d9708d3e67c99b8eb97769728350510cfa1524053e3d297a566dfab3728be319127a7e603adbc16ab94ee405c68d7c75efbd6fae1298227a8084eae8494575b83744a1fe3a05d4d8ee63a33d25098e6daa45f1411cc37d740edb698b9fe015c67bca3f974d67a608455b6301ae4a9c93896668d9bc7211cc262b4b473d8211f6765f113b47870be21859d0c3c4c0d2c15b24a56a38986184e0f88c84a4ca596499f306453566830b44873a5f800142a541b47f7eb3b11cdecf092c48b4ab84b9bce5be5fb23f3a6bc9cac92277212d81da19d9d7b9605837c80906e183ac86ecd000c360b69a0563e4879edaa752b89ef8357c73d91fbdf1d3355c3b35d85e6849dd941d51e96113750c94a2c0c67b3a7ce14a418fd5a24e08a4d867d5794aceeefd0694628b51a970c6dec31c192a2f24e582df64337d3b5c4e40d64b0e2896543c1aa367830c5af1edcfb7465b6d12d2badff98aa0baa166386675fdd2899d41304cb75dbae9a0a2d5fa81b5c695d50a12a211093e09c9a7f61db2ecca3699792e941a1df814b187ecf210e5d1b19308a2d817f2e73374c06622fe0ffb8e33d63ea2e34a207424c8f50cb9ee8980170d27ee359d41564b5daa7ecacdc0a7c1677a2e61cd0d8408c407868c46eed8a88f717f9bfaf6f83a89532d628942b6a7b7ae8996ef3d00a6733361826fb93ee0eb2f9f6711a973ec0ab3faeb0f69b0562f9c49f16e3bc7344aa8b5fefb344d16229326608675da6f590e4eaaa01ad9438b2860134ddd6e710d8805ee64b68064520e6c99e10d372c46aa4e575f6e723383c9b67068c45bc0b0c79fe4089209a44c9b4b91fd37469fd8e62aa154edc036936fe947c3162f6428cfbae9c65edf83b275458af48735300e9d896d1da8efb85f7882dcfcca98b3089c0be44069301646e8dca6a24072954672c54b666b99f8d7ba91021dd7b011d873a347f79e693879c77fcfb6b7a483003280aca9f45ffbd13ccf3b9d33499b96c0bc2d156a642127c053eae3dec9ba240f4eb40e58d54f0790bcb72306e900945a16f2336c1411cc6d18c22f50b1e1af0fb8164cc91dc8e3f164c4dda4a4c86335038aec421ef20aaf1b0da28b0a864d66f16aaa8fedf9fbd0f2e89fb0e1a43a1230b5dbcdacb36d650029839615267a0479898afb936065156f2323e6611ba3e574f5aa07fd6a69004d9f9016b62f061cf2c5cc670a4371e0b89d7b5e5acb9c7d98fb77c0284d17edb1692d65543818f1378063111dce70c909b8165620b5f6ed60a58637c8049dd247f7006a05f501596246e2690f9452518c3429be9b7483062a1b96c38e7ca3b7a42ba2d879165a3ee9912a812bba78c68ecd7a90584768fac436634fc95a1e835dc869a70cf191b483a8f74bf3dd4fbbea61d2f890519716203495cfebedf1dfa8bf9e567bb966c75826fdb19fea407f5062f2a3758ae6bbc996afccd02af0c226f21623e00262e20fd15b8413767c3900d80b3683ce8dc3e3384973386d7b6b7cedef97fb6af76784c9f882756461e6fbff66844c8869eb96e942c9dc8e80048c70cca7c27bcfaec0846f6a6e1d06a2f1abcb575af0d7bc0bfdfa097d2ce6a8513f1355bdb3c9eb1839065113a3758800ff468be661b01edf9c46e3757fcced52eab54d7277504544b003f86b5bde5442a0bb6c2ab6bc914d7ae8fc0d4c2f9de3797b705e745aadb77f09570a11dc9d0f6731d24c91d60528bff"}, @typed={0x4, 0x27}]}, @nested={0x18, 0x78, [@generic="282201554de4999e7adac7f04fd6f5803c51fe94"]}, @nested={0x1c, 0x0, [@typed={0x4}, @generic, @typed={0x14, 0x23, @ipv6=@empty}]}, @typed={0x8, 0x8, @fd}]}, 0x98c}}, 0x80) 03:18:14 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:14 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:14 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@context={'context', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) 03:18:15 executing program 5: syz_emit_ethernet(0x16, &(0x7f0000000340)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @dev, [], {@llc_tr={0x11, {@snap={0x0, 0x0, "e5", "7d72c4"}}}}}, 0x0) 03:18:15 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:15 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x3, &(0x7f0000000280)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xf, 0x5c}}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfc76, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffe77}, 0x48) 03:18:15 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) sendmsg$nl_netfilter(r0, &(0x7f0000000100)={&(0x7f0000000080), 0xc, &(0x7f00000000c0)={&(0x7f0000001a00)={0x98c, 0x0, 0x0, 0x0, 0x0, 0x25dfdbfb, {}, [@generic="d96e66f138d88bdb3c782577eb9506230a7aa6983d9cea988e1f07f46a0943c4a4e789c73d768428560de5337da19cf464a54a4ef0f685bf17e5141bc9fa5e579c0d8d128178dd55048556", @nested={0x8f0, 0x87, [@generic="236f5c4a97f3dfcf1effe640e1108d665898f69a37f1ecc63dbe2579b03b6cc3f38e8c9f8c6c1a75d7f10a58f97a7f1f17a0ad1023eaab2417082f3d45a7d7c65c7722b34405113fce2ea0d4c4f04ca24824efb782", @generic="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", @typed={0x794, 0x21, @binary="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"}, @typed={0x4, 0x27}]}, @nested={0x18, 0x78, [@generic="282201554de4999e7adac7f04fd6f5803c51fe94"]}, @nested={0x1c, 0x0, [@typed={0x4}, @generic, @typed={0x14, 0x23, @ipv6=@empty}]}, @typed={0x8, 0x8, @fd}]}, 0x98c}}, 0x80) 03:18:15 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x3, &(0x7f0000000280)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0xf}}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfc76, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffe77}, 0x48) 03:18:15 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) [ 1590.804176][ T9635] [ 1590.806549][ T9635] ********************************************************** [ 1590.883460][ T9635] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 1590.923229][ T9635] ** ** 03:18:15 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) ioctl$KVM_NMI(r2, 0xae9a) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:18:15 executing program 3: socket(0x0, 0x0, 0x0) setxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() sendto(0xffffffffffffffff, 0x0, 0x488, 0x0, 0x0, 0xffffffffffffffa5) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$KDSETMODE(r1, 0x4b3a, 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) tkill(r0, 0x1020000000016) 03:18:15 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) [ 1590.960753][ T9635] ** trace_printk() being used. Allocating extra memory. ** [ 1591.034090][ T9635] ** ** [ 1591.068203][ T9635] ** This means that this is a DEBUG kernel and it is ** [ 1591.113637][ T9635] ** unsafe for production use. ** [ 1591.173654][ T9635] ** ** [ 1591.205265][ T9635] ** If you see this message and you are not debugging ** [ 1591.262091][ T9635] ** the kernel, report this immediately to your vendor! ** [ 1591.293645][ T9635] ** ** [ 1591.333189][ T9635] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 1591.363495][ T9635] ********************************************************** [ 1592.725970][ T9761] IPVS: ftp: loaded support on port[0] = 21 [ 1592.821660][ T9761] chnl_net:caif_netlink_parms(): no params data found [ 1592.858442][ T9761] bridge0: port 1(bridge_slave_0) entered blocking state [ 1592.865943][ T9761] bridge0: port 1(bridge_slave_0) entered disabled state [ 1592.874353][ T9761] device bridge_slave_0 entered promiscuous mode [ 1592.882778][ T9761] bridge0: port 2(bridge_slave_1) entered blocking state [ 1592.890155][ T9761] bridge0: port 2(bridge_slave_1) entered disabled state [ 1592.899086][ T9761] device bridge_slave_1 entered promiscuous mode [ 1592.921791][ T9761] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1592.934909][ T9761] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1592.959765][ T9761] team0: Port device team_slave_0 added [ 1592.968520][ T9761] team0: Port device team_slave_1 added [ 1593.046480][ T9761] device hsr_slave_0 entered promiscuous mode [ 1593.093912][ T9761] device hsr_slave_1 entered promiscuous mode [ 1593.133503][ T9761] debugfs: Directory 'hsr0' with parent '/' already present! [ 1593.186279][ T9761] bridge0: port 2(bridge_slave_1) entered blocking state [ 1593.193433][ T9761] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1593.200999][ T9761] bridge0: port 1(bridge_slave_0) entered blocking state [ 1593.208131][ T9761] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1593.295685][ T9761] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1593.311906][ T4261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1593.322822][ T4261] bridge0: port 1(bridge_slave_0) entered disabled state [ 1593.346429][ T4261] bridge0: port 2(bridge_slave_1) entered disabled state [ 1593.366463][ T4261] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1593.392904][ T9761] 8021q: adding VLAN 0 to HW filter on device team0 [ 1593.410655][ T4261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1593.420384][ T4261] bridge0: port 1(bridge_slave_0) entered blocking state [ 1593.427782][ T4261] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1593.446908][T29507] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1593.455888][T29507] bridge0: port 2(bridge_slave_1) entered blocking state [ 1593.462979][T29507] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1593.486767][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1593.496764][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1593.515638][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1593.524318][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1593.532689][T24912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1593.544538][ T9761] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1593.568154][ T4261] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1593.576568][ T4261] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1593.591145][ T9761] 8021q: adding VLAN 0 to HW filter on device batadv0 03:18:18 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=@ipv4_newroute={0x24, 0x18, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_ENCAP_TYPE={0x8, 0x15, 0x2}]}, 0x24}}, 0x0) 03:18:18 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:18 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) 03:18:18 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x5, 0x6, 0x1bf, 0x4}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r0, &(0x7f0000000300)}, 0x20) 03:18:18 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x3, &(0x7f0000000280)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xf, 0x55}}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfc76, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffe77}, 0x48) 03:18:18 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000002c0)=[{&(0x7f0000000300)="580000001400192340834b80043f679a10ffff7f4e32f61b26a054e8b0f23d12cdf1e422000000000100804824ca945f64009400050028925aaa000000000000008400f0ff00ff050000000010000100090ac2d00b0ccbd8", 0x58}], 0x1) 03:18:18 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) [ 1593.882602][ T9780] netlink: 'syz-executor.0': attribute type 21 has an invalid length. 03:18:18 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000280)={0x0, 0x1}, 0x0, &(0x7f00000003c0)="0e", 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) ptrace(0x4200, 0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000080)={0x9d0000, 0xfffc0000, 0x1, [], &(0x7f0000000040)={0x9b0902, 0x10000, [], @p_u16=&(0x7f0000000000)=0x7}}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0x663abba741622feb) ioctl$KVM_NMI(r2, 0xae9a) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x22000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:18:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000280)={0x0, 0x1}, 0x0, &(0x7f00000003c0)="0e", 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x4200, 0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) r3 = open(0x0, 0x141046, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) ioctl$VIDIOC_S_EXT_CTRLS(r3, 0xc0205648, &(0x7f0000000080)={0x9d0000, 0xfffc0000, 0x1, [], &(0x7f0000000040)={0x9b0902, 0x10000, [], @p_u16=&(0x7f0000000000)=0x7}}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0x663abba741622feb) ioctl$KVM_NMI(r2, 0xae9a) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:18:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000280), 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x4200, 0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) ioctl$VIDIOC_S_EXT_CTRLS(r3, 0xc0205648, &(0x7f0000000080)={0x9d0000, 0x0, 0x1, [], &(0x7f0000000040)={0x9b0902, 0x10000, [], @p_u16}}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0x663abba741622feb) ioctl$KVM_NMI(r2, 0xae9a) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:18:18 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:19 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:19 executing program 5: socket$inet6(0xa, 0x0, 0x6b) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") socket$inet6_tcp(0xa, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x9) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/224, 0xe0, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) pread64(r3, &(0x7f0000000180)=""/224, 0x17c, 0x4db4) 03:18:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, 0x0, 0x0) 03:18:19 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:19 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f0000000040)="a2e6fa9a", 0x4) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8475071") setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0x190, 0x4) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendto$inet6(r0, &(0x7f0000000100)="ce03100001000100ff901efc9fb35c22cc6dc30000000000070fffeceb92bd30961166bf00000000070000e13e00004d3839be61fdadec4d81e5a56e", 0x3c, 0x0, 0x0, 0x0) 03:18:19 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:19 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:19 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg$inet(r0, &(0x7f0000004b80)=[{{0x0, 0x0, &(0x7f0000000040)=[{0x0}, {&(0x7f0000000280)="a1", 0x1}], 0x2}}], 0x1, 0x600d054) 03:18:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000080)={0x9d0000, 0x0, 0x0, [], 0x0}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0x663abba741622feb) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:18:19 executing program 5: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000600000000000800120000ffff00000000000000000006000000000000000000800000000000e00000010b00000000000000000035000000000000000000000000ff00000000030006000000000002000004000000bb000000000000000003000500000000000200423b000000000000004000000000"], 0x80}}, 0x0) socket$key(0xf, 0x3, 0x2) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) [ 1595.136766][T10141] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:18:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000640)={"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"}) ioctl$KVM_SET_MP_STATE(r5, 0x4004ae99, &(0x7f0000000080)=0x10000000002) ioctl$KVM_SET_VCPU_EVENTS(r5, 0x4040aea0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9, 0x0, 0x8, 0x3}) ioctl$KVM_RUN(r5, 0xae80, 0x0) 03:18:19 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:20 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = socket$inet(0x2, 0x200000002, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000780)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x0, @loopback}, 0x4}}, 0x26) dup3(r0, r1, 0x0) 03:18:20 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:20 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000000)={&(0x7f0000ffb000/0x5000)=nil, 0x0, 0x2, 0xbad3fc0971f692d8, &(0x7f0000ffc000/0x4000)=nil}) 03:18:20 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r2}], 0x1, 0xffffffffffbffff8) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) tkill(r0, 0x16) restart_syscall() socket$inet(0x2, 0x4000000000000001, 0x0) 03:18:20 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000640)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_SET_MP_STATE(r5, 0x4004ae99, &(0x7f0000000080)=0x10000000002) ioctl$KVM_SET_VCPU_EVENTS(r5, 0x4040aea0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9, 0x0, 0x8, 0x3}) ioctl$KVM_RUN(r5, 0xae80, 0x0) 03:18:20 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000080)={0x9d0000, 0x0, 0x0, [], 0x0}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0x663abba741622feb) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1597.462156][T10389] IPVS: ftp: loaded support on port[0] = 21 [ 1597.551572][T10389] chnl_net:caif_netlink_parms(): no params data found [ 1597.583428][T10389] bridge0: port 1(bridge_slave_0) entered blocking state [ 1597.591065][T10389] bridge0: port 1(bridge_slave_0) entered disabled state [ 1597.600169][T10389] device bridge_slave_0 entered promiscuous mode [ 1597.613226][T10389] bridge0: port 2(bridge_slave_1) entered blocking state [ 1597.620828][T10389] bridge0: port 2(bridge_slave_1) entered disabled state [ 1597.631468][T10389] device bridge_slave_1 entered promiscuous mode [ 1597.651676][T10389] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1597.663998][T10389] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1597.688491][T10389] team0: Port device team_slave_0 added [ 1597.697223][T10389] team0: Port device team_slave_1 added [ 1597.748937][T10389] device hsr_slave_0 entered promiscuous mode [ 1597.794002][T10389] device hsr_slave_1 entered promiscuous mode [ 1597.843575][T10389] debugfs: Directory 'hsr0' with parent '/' already present! [ 1597.869256][T10389] bridge0: port 2(bridge_slave_1) entered blocking state [ 1597.878221][T10389] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1597.885771][T10389] bridge0: port 1(bridge_slave_0) entered blocking state [ 1597.893149][T10389] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1597.942023][T10389] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1597.955866][ T9769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1597.968084][ T9769] bridge0: port 1(bridge_slave_0) entered disabled state [ 1597.977160][ T9769] bridge0: port 2(bridge_slave_1) entered disabled state [ 1597.988275][ T9769] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1598.002682][T10389] 8021q: adding VLAN 0 to HW filter on device team0 [ 1598.040904][ T9769] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1598.076051][ T9769] bridge0: port 1(bridge_slave_0) entered blocking state [ 1598.083256][ T9769] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1598.126539][ T4261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1598.137457][ T4261] bridge0: port 2(bridge_slave_1) entered blocking state [ 1598.144609][ T4261] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1598.164571][ T4261] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1598.174555][ T4261] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1598.234626][ T9769] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1598.246700][ T9769] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1598.258551][ T9769] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1598.270373][T10389] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1598.376340][ T4262] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1598.384614][ T4262] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1598.398637][T10389] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1598.413784][ T7] tipc: TX() has been purged, node left! [ 1598.419804][ T7] tipc: TX() has been purged, node left! [ 1598.544573][ T7] tipc: TX() has been purged, node left! 03:18:23 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:23 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="00bd0c0000727920"], 0x3ff800) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) 03:18:23 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='}e:P\xe5\xee', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r0, 0x0) clock_getres(0x0, &(0x7f0000000000)) 03:18:23 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000640)={"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"}) ioctl$KVM_SET_MP_STATE(r5, 0x4004ae99, &(0x7f0000000080)=0x10000000002) ioctl$KVM_SET_VCPU_EVENTS(r5, 0x4040aea0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9, 0x0, 0x8, 0x3}) ioctl$KVM_RUN(r5, 0xae80, 0x0) 03:18:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000080)={0x9d0000, 0x0, 0x0, [], 0x0}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0x663abba741622feb) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1598.753721][ T7] tipc: TX() has been purged, node left! 03:18:23 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffc}]}) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='wlan1\x00', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 03:18:23 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) [ 1598.900018][ T7] tipc: TX() has been purged, node left! [ 1598.936417][ T7] tipc: TX() has been purged, node left! [ 1599.023759][ T7] tipc: TX() has been purged, node left! [ 1599.042318][ T7] tipc: TX() has been purged, node left! [ 1599.053183][ T23] audit: type=1326 audit(1575256703.700:90): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=10476 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d4ba code=0xffff0000 03:18:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000080)={0x9d0000, 0x0, 0x0, [], 0x0}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0x663abba741622feb) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1599.164697][ T7] tipc: TX() has been purged, node left! [ 1599.199381][ T7] tipc: TX() has been purged, node left! 03:18:23 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0x0, 0x0}) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8475071") r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000a0cff4)={0x4400000010, 0x0, 0x0, 0x70a0}, 0xc) getsockopt$netlink(r1, 0x10e, 0x8000000009, &(0x7f00007e0000)=""/4, &(0x7f0000000100)=0x4) [ 1599.231866][ T7] tipc: TX() has been purged, node left! [ 1599.269601][ T7] tipc: TX() has been purged, node left! 03:18:24 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x400812fa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "1c69ab0d058b1b678397214eec9ff0d0cc8773ebb2cfd89b0252317a845d3df759d280ad530ff887d31ed8f9bf42b889fadb99a5defc79bd6b2023939c49224f", "e9af2deca424f1d69c3cef2acc10d15cae4da1bf9b1c974dd2de2185a2ae81bbcb58ebaa0b202596b0b84f59798e42bca13b7dd7218fcb5e75d1d7299ff17955", "804c0e6791e9da90dce632e1e4efa40c25402952a8dd77a5bf0805cfc3425350"}) 03:18:24 executing program 2: socket$inet6(0xa, 0x3, 0x6b) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) [ 1599.810356][ T23] audit: type=1326 audit(1575256704.460:91): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=10476 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d4ba code=0xffff0000 03:18:25 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000040)=0x2caa5ae371b4617c) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 03:18:25 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x400c12f5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "1c69ab0d058b1b678397214eec9ff0d0cc8773ebb2cfd89b0252317a845d3df759d280ad530ff887d31ed8f9bf42b889fadb99a5defc79bd6b2023939c49224f", "e9af2deca424f1d69c3cef2acc10d15cae4da1bf9b1c974dd2de2185a2ae81bbcb58ebaa0b202596b0b84f59798e42bca13b7dd7218fcb5e75d1d7299ff17955", "804c0e6791e9da90dce632e1e4efa40c25402952a8dd77a5bf0805cfc3425350"}) 03:18:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r4, 0x4040aea0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x5, 0x0, 0x0, 0xa4}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 03:18:25 executing program 2: socket$inet6(0xa, 0x3, 0x6b) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:25 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x125f, 0x0) 03:18:25 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000000)={&(0x7f0000ffb000/0x5000)=nil, 0x1000000, 0x2, 0xbad3fc0971f692d8, &(0x7f0000ffc000/0x4000)=nil}) 03:18:26 executing program 2: socket$inet6(0xa, 0x3, 0x6b) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:26 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:26 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x7d0d9e5890d9665f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0xd10c) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)=',nodev(\x00') 03:18:26 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x35) timer_create(0x0, 0x0, &(0x7f0000000040)) timer_delete(0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x7, 0x0, 0x7}) mount$fuseblk(0x0, 0x0, &(0x7f0000000080)='fuseblk\x00', 0x0, 0x0) 03:18:26 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xef, 0x209e21, 0x100008000000001, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f00000000c0), &(0x7f0000000180)}, 0x20) 03:18:26 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x125f, 0x0) sysfs$2(0x2, 0x0, 0x0) 03:18:26 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:26 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_STATUS64(r0, 0x125f, 0x0) 03:18:26 executing program 4: write$P9_RUNLINKAT(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x373, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000005b00)="1213772e65e4075827a85fddef692ef3", 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x12fb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "1c69ab0d058b1b678397214eec9ff0d0cc8773ebb2cfd89b0252317a845d3df759d280ad530ff887d31ed8f9bf42b889fadb99a5defc79bd6b2023939c49224f", "e9af2deca424f1d69c3cef2acc10d15cae4da1bf9b1c974dd2de2185a2ae81bbcb58ebaa0b202596b0b84f59798e42bca13b7dd7218fcb5e75d1d7299ff17955", "804c0e6791e9da90dce632e1e4efa40c25402952a8dd77a5bf0805cfc3425350"}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$KVM_GET_MP_STATE(r1, 0x8004ae98, 0x0) 03:18:26 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:26 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) 03:18:26 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 03:18:26 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) [ 1603.709752][T11055] IPVS: ftp: loaded support on port[0] = 21 [ 1603.788163][T11055] chnl_net:caif_netlink_parms(): no params data found [ 1603.827001][T11055] bridge0: port 1(bridge_slave_0) entered blocking state [ 1603.834342][T11055] bridge0: port 1(bridge_slave_0) entered disabled state [ 1603.843257][T11055] device bridge_slave_0 entered promiscuous mode [ 1603.852134][T11055] bridge0: port 2(bridge_slave_1) entered blocking state [ 1603.860794][T11055] bridge0: port 2(bridge_slave_1) entered disabled state [ 1603.870016][T11055] device bridge_slave_1 entered promiscuous mode [ 1603.890978][T11055] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1603.902944][T11055] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1603.928910][T11055] team0: Port device team_slave_0 added [ 1603.937851][T11055] team0: Port device team_slave_1 added [ 1603.996658][T11055] device hsr_slave_0 entered promiscuous mode [ 1604.054107][T11055] device hsr_slave_1 entered promiscuous mode [ 1604.093864][T11055] debugfs: Directory 'hsr0' with parent '/' already present! [ 1604.121631][T11055] bridge0: port 2(bridge_slave_1) entered blocking state [ 1604.128778][T11055] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1604.136496][T11055] bridge0: port 1(bridge_slave_0) entered blocking state [ 1604.143891][T11055] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1604.209486][T11055] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1604.230618][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1604.240727][T30581] bridge0: port 1(bridge_slave_0) entered disabled state [ 1604.249191][T30581] bridge0: port 2(bridge_slave_1) entered disabled state [ 1604.259550][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1604.273280][T11055] 8021q: adding VLAN 0 to HW filter on device team0 [ 1604.298489][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1604.308222][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 1604.315886][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1604.333966][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1604.344431][T30581] bridge0: port 2(bridge_slave_1) entered blocking state [ 1604.351546][T30581] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1604.383289][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1604.393599][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1604.402242][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1604.410693][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1604.419881][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1604.437721][T11055] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1604.470194][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1604.479966][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1604.492260][T11055] 8021q: adding VLAN 0 to HW filter on device batadv0 03:18:29 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r4, 0x4040aea0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xa4}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 03:18:29 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:18:29 executing program 4: write$P9_RUNLINKAT(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x373, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x12fb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "1c69ab0d058b1b678397214eec9ff0d0cc8773ebb2cfd89b0252317a845d3df759d280ad530ff887d31ed8f9bf42b889fadb99a5defc79bd6b2023939c49224f", "e9af2deca424f1d69c3cef2acc10d15cae4da1bf9b1c974dd2de2185a2ae81bbcb58ebaa0b202596b0b84f59798e42bca13b7dd7218fcb5e75d1d7299ff17955", "804c0e6791e9da90dce632e1e4efa40c25402952a8dd77a5bf0805cfc3425350"}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:18:29 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:29 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000000)=ANY=[]) 03:18:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r0 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) 03:18:29 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socket$kcm(0x11, 0x3, 0x300) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair(0x2, 0x3, 0x3, &(0x7f00000000c0)) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @local}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x0, 'memory', 0xea}]}, 0xfa38) 03:18:29 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001340)=[{&(0x7f00000010c0)=""/246, 0xf6}, {0x0}, {0x0}], 0x3) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xa1720495f3f7edd, 0x0, 0x0, 0x800e00516) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r2, 0xffff, 0x1006, &(0x7f0000000000)={0x9}, 0x10) shutdown(0xffffffffffffffff, 0x0) recvfrom$inet(r2, 0x0, 0x893f, 0x0, 0x0, 0x800e00519) shutdown(r1, 0x0) shutdown(r2, 0x0) 03:18:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) r0 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xff) open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl(0xffffffffffffffff, 0x0, 0x0) sigaltstack(&(0x7f0000001000/0x2000)=nil, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) getpid() pipe(&(0x7f0000000200)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) sched_setattr(0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) 03:18:29 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) [ 1605.213421][ C0] net_ratelimit: 12 callbacks suppressed [ 1605.213427][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1605.250164][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:18:30 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:30 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x400, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000200), 0xc) connect$inet6(0xffffffffffffffff, 0x0, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) socket(0x0, 0x803, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000dc0)=[{0x0}], 0x1, 0x81808) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) write(0xffffffffffffffff, &(0x7f0000cc2fed), 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 03:18:30 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003a00)={&(0x7f0000003980)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x4}, {0x3, 0x5}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000005d40)=""/4096, 0x41, 0x1000, 0x1}, 0x20) 03:18:30 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000080)={0x0, 0x0, 0x1, [], &(0x7f0000000040)={0x9b0902, 0x10000, [], @p_u16=0x0}}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0x663abba741622feb) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:18:30 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) close(r0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x100000039, &(0x7f0000000000)=[{&(0x7f0000000380)=""/110, 0xffffffd9}], 0x1, 0x0, 0x4a}, 0x2f04) 03:18:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001340)=[{&(0x7f00000010c0)=""/246, 0xf6}, {0x0}, {0x0}, {0x0}], 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xa1720495f3f7edd, 0x0, 0x0, 0x800e00516) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x15, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0x893f, 0x0, 0x0, 0x800e00519) shutdown(r1, 0x0) shutdown(r2, 0x0) 03:18:30 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:30 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000540), 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000006c0)=@pppoe={0x18, 0x0, {0x2, @random="1250c8010805", 'ba\xd1\xbcj\x94\x86\xb2\xf8@\x00\x00\x00\x00\x00\t'}}, 0x80, 0x0}, 0x4088) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'tunl0\x00'}) openat$tun(0xffffffffffffff9c, 0x0, 0x20000, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r1 = socket$kcm(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x410, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480), 0x44) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0), 0xc) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x7fff, 0x8}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000440)={r2, &(0x7f00000002c0)="74411fed71c819ab98dbe0bd72ad9dc50574f1dbffa19448ee8d565b4840d767b4fc4f8b7cbb22ead1e4a9c431ee7a4b0607e5c69e1915dbeb48018364927238ec5998050f3fcaad5014a62202f8d00b8738dd43c251834a5a6a2e7728806ae4287f49e0e7bc3adb3b029fc87fb2febdb55b08b538051c9808545f91dcbd358cac24354b9d24e3d262878e265062ef6f8d90c5aabb7e9c411221b51b4db4d8fa8baf37f79c7697dbb9be0e0ad9618f990860dc3312cde3623d558b50bcf3ab92ee687ac4fd866385fc2666c28b3539cbb4ed7c63a549738080e2d58387dc66014910eed415", 0x0, 0x4}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\xff', 0x1ff) sendmsg$kcm(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x7, r3, 0x2) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0xba, 0x800, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1000000, 0x0, @perf_bp={&(0x7f0000000180)}, 0x800, 0xaacd, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x11) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) socket$kcm(0x29, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:18:30 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac141412e0", 0x0, 0x9}, 0x28) 03:18:30 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f00000000c0)=ANY=[@ANYBLOB="89ea03ff0a0001eeff95856901fcffffffffffc84d000000000000373edf8cd8f8000000000000fb00000000000000000081e2c8fd7977dc938847b4017fce1977c49a7d8436d8bd7b24f253f6efceb708b29fac4d9df72274950fbdf368b9b70121fd6cd88af71a2017d00b5dcf7be75303a0a652217215de618cc65016d5ab11eea00ab283b0"], 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x2000) 03:18:30 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:31 executing program 2: socket$inet6(0xa, 0x3, 0x6b) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) close(r0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x100000039, &(0x7f0000000000)=[{&(0x7f0000000380)=""/110, 0xffffffd9}], 0x1, 0x0, 0x4a}, 0x2f04) 03:18:31 executing program 2: socket$inet6(0xa, 0x3, 0x6b) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:31 executing program 2: socket$inet6(0xa, 0x3, 0x6b) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:31 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x0, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:31 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x0, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) [ 1608.574133][T12194] IPVS: ftp: loaded support on port[0] = 21 [ 1608.656206][T12194] chnl_net:caif_netlink_parms(): no params data found [ 1608.698273][T12194] bridge0: port 1(bridge_slave_0) entered blocking state [ 1608.706951][T12194] bridge0: port 1(bridge_slave_0) entered disabled state [ 1608.720525][T12194] device bridge_slave_0 entered promiscuous mode [ 1608.730133][T12194] bridge0: port 2(bridge_slave_1) entered blocking state [ 1608.742219][T12194] bridge0: port 2(bridge_slave_1) entered disabled state [ 1608.754488][T12194] device bridge_slave_1 entered promiscuous mode [ 1608.780282][T12194] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1608.792016][T12194] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1608.822684][T12194] team0: Port device team_slave_0 added [ 1608.839873][T12194] team0: Port device team_slave_1 added [ 1608.896859][T12194] device hsr_slave_0 entered promiscuous mode [ 1608.944142][T12194] device hsr_slave_1 entered promiscuous mode [ 1608.983525][T12194] debugfs: Directory 'hsr0' with parent '/' already present! [ 1609.006699][T12194] bridge0: port 2(bridge_slave_1) entered blocking state [ 1609.013839][T12194] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1609.021270][T12194] bridge0: port 1(bridge_slave_0) entered blocking state [ 1609.029273][T12194] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1609.091620][T12194] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1609.106113][T16059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1609.116917][T16059] bridge0: port 1(bridge_slave_0) entered disabled state [ 1609.125201][T16059] bridge0: port 2(bridge_slave_1) entered disabled state [ 1609.142786][T16059] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1609.160145][T12194] 8021q: adding VLAN 0 to HW filter on device team0 [ 1609.172698][T16059] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1609.181413][T16059] bridge0: port 1(bridge_slave_0) entered blocking state [ 1609.188636][T16059] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1609.208319][ T4261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1609.218262][ T4261] bridge0: port 2(bridge_slave_1) entered blocking state [ 1609.225392][ T4261] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1609.245799][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1609.254722][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1609.272757][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1609.281457][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1609.294640][T31123] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1609.306195][T12194] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1609.333828][T31123] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1609.341604][T31123] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1609.355464][T12194] 8021q: adding VLAN 0 to HW filter on device batadv0 03:18:34 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:34 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x0, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) close(r0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x100000039, &(0x7f0000000000)=[{&(0x7f0000000380)=""/110, 0xffffffd9}], 0x1, 0x0, 0x4a}, 0x2f04) 03:18:34 executing program 0: timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) semop(0x0, &(0x7f0000000080)=[{}], 0x1) r0 = gettid() tkill(r0, 0x15) 03:18:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) pread64(r3, &(0x7f0000000180)=""/224, 0x17c, 0x4db4) 03:18:34 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000001200)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)=0x900) 03:18:34 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:34 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x10052, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000014c0), 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@xdp, &(0x7f0000000140)=0x80) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@loopback, @remote, @local, 0x0, 0x0, 0x10001, 0x580, 0xfff, 0x400200}) r1 = getpgid(0x0) memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x1) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) writev(r2, &(0x7f0000000040), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000380)='/dev/full\x00', 0x2f240, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r5 = gettid() waitid(0x83b895581628fca4, r5, &(0x7f0000000040), 0x2, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)}, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x227d, 0x0) kcmp(r1, r5, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f00000000c0)='syz1\x00'}, 0x30) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x9) socket$inet6_udp(0xa, 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000002b2786743c4195c8d5dcde565620f223a667d16df51df557f249a31d4a16eb7ea604f82ef65c12b3b87e7998dfef1e08809dd4d3988a4a725d2e17e7d36c0ce5184c623910fe4a0d1e"], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, &(0x7f0000000280)) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r6, 0x84, 0x78, &(0x7f0000000040), 0x4) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r7, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8) socket(0x1e, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000800)) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r7, 0x84, 0x78, &(0x7f0000000040), 0x4) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x1, 0x100, 0x0, 0x1, 0xb6, 0x0, 0x0, {r8, @in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x10000, 0x0, 0x0, 0x0, 0x2e}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000000), 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x10001}, 0x8) r9 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r9, 0x84, 0x23, &(0x7f0000000180), 0x8) 03:18:34 executing program 5: r0 = inotify_init() ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x4) 03:18:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) ptrace$getsig(0x4202, 0x0, 0x0, 0x0) listen(r0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) memfd_create(0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xe, 0x20040884, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x1) recvfrom$inet6(r1, &(0x7f0000000040)=""/31, 0x1f, 0x0, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0)='A', 0x1, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, 0x0, 0x0) dup2(r0, r1) [ 1609.880488][T12335] bridge0: port 3(gretap0) entered blocking state 03:18:34 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f0000000040)={0x6}, 0x10) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) shutdown(0xffffffffffffffff, 0x0) write(r2, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0x5298f83365f71587, 0x42, 0x0, 0x800e00606) shutdown(r0, 0x0) [ 1609.923167][T12335] bridge0: port 3(gretap0) entered disabled state 03:18:34 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:34 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x5, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x5, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8ab}, 0x24800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x667a}, 0xffffffffffffffff, 0x1, r0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='pids.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x16000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e001a000000e8bd6efb250009000e0001000a0000ff050005001201", 0x2e}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x5, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x5, 0x0, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8ab}, 0x24800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x667a}, 0xffffffffffffffff, 0x1, r1, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x5, 0x70, 0x3, 0xc1, 0x1, 0xf8, 0x0, 0x6, 0x80000, 0xb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfffffffa, 0x1, @perf_bp={&(0x7f00000001c0), 0x8}, 0x0, 0x100, 0x6, 0x6, 0xa84a, 0x81, 0x910}, r1, 0xc, 0xffffffffffffffff, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000631177fbac14140ce4", 0x0, 0x9}, 0x28) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)=r2) [ 1610.056670][T12335] device gretap0 entered promiscuous mode [ 1610.092465][T12335] bridge0: port 3(gretap0) entered blocking state [ 1610.099060][T12335] bridge0: port 3(gretap0) entered forwarding state 03:18:35 executing program 3: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x11000, 0x0, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1776}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='.+lgroup/\r\x85\xdc\xb0|\x03>@H\x03%\xde\x00\x04\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000540), 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000006c0)=@pppoe={0x18, 0x0, {0x2, @random="1250c8010805", 'ba\xd1\xbcj\x94\x86\xb2\xf8@\x00\x00\x00\x00\x00\t'}}, 0x80, 0x0}, 0x4088) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'tunl0\x00'}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x20000, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x410, 0x0, 0xffffffff, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x3}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r3, 0xffffffffffffff23, &(0x7f0000000500)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r4}, 0x44) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={r4}, 0xc) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={r4, 0x7fff, 0x8}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000440)={r5, &(0x7f00000002c0)="74411fed71c819ab98dbe0bd72ad9dc50574f1dbffa19448ee8d565b4840d767b4fc4f8b7cbb22ead1e4a9c431ee7a4b0607e5c69e1915dbeb48018364927238ec5998050f3fcaad5014a62202f8d00b8738dd43c251834a5a6a2e7728806ae4287f49e0e7bc3adb3b029fc87fb2febdb55b08b538051c9808545f91dcbd358cac24354b9d24e3d262878e265062ef6f8d90c5aabb7e9c411221b51b4db4d8fa8baf37f79c7697dbb9be0e0ad9618f990860dc3312cde3623d558b50bcf3ab92ee687ac4fd866385fc2666c28b3539cbb4ed7c63a549738080e2d58387dc66014910eed415", &(0x7f00000003c0)=""/104, 0x4}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\xff', 0x1ff) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000140)='./file0\x00'}, 0x10) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000240)=r6) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x20b, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008108040f80ecdb4cb92e0a480e001a000000e8bd6efb120009000e0002000c0000ff050005001204", 0x2e}], 0x1}, 0x0) r7 = gettid() r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(0x0, r7, 0x7, r8, 0x2) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0xba, 0x800, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1000000, 0x0, @perf_bp={&(0x7f0000000180)}, 0x800, 0xaacd, 0x0, 0x0, 0x0, 0x2, 0x20}, r7, 0x8, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x8}, r7, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x11) perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) r9 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open$cgroup(0x0, r9, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0x29, 0x1, 0x0) sendmsg$kcm(r10, &(0x7f0000000080)={&(0x7f0000000100)=@ethernet={0x1, @random="06e5596b0f8a"}, 0xfffffeb8, &(0x7f00000008c0), 0x7, &(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1297}, 0x4000000) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:18:35 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) r0 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x0, 0xff) connect$inet6(r1, 0x0, 0x0) open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl(0xffffffffffffffff, 0x0, 0x0) getpid() socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000200)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) iopl(0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) sched_setattr(0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) 03:18:35 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:35 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000440)='/dev/audio\x00', 0x40001, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000001200)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)=0x900) 03:18:35 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x10052, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000014c0), 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@xdp, &(0x7f0000000140)=0x80) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@loopback, @remote, @local, 0x0, 0x0, 0x10001, 0x580, 0xfff, 0x400200}) r1 = getpgid(0x0) memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x1) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) writev(r2, &(0x7f0000000040), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000380)='/dev/full\x00', 0x2f240, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r5 = gettid() waitid(0x83b895581628fca4, r5, &(0x7f0000000040), 0x2, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)}, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x227d, 0x0) kcmp(r1, r5, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f00000000c0)='syz1\x00'}, 0x30) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x9) socket$inet6_udp(0xa, 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000002b2786743c4195c8d5dcde565620f223a667d16df51df557f249a31d4a16eb7ea604f82ef65c12b3b87e7998dfef1e08809dd4d3988a4a725d2e17e7d36c0ce5184c623910fe4a0d1e"], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, &(0x7f0000000280)) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r6, 0x84, 0x78, &(0x7f0000000040), 0x4) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r7, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8) socket(0x1e, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000800)) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r7, 0x84, 0x78, &(0x7f0000000040), 0x4) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x1, 0x100, 0x0, 0x1, 0xb6, 0x0, 0x0, {r8, @in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x10000, 0x0, 0x0, 0x0, 0x2e}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000000), 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x10001}, 0x8) r9 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r9, 0x84, 0x23, &(0x7f0000000180), 0x8) 03:18:35 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:35 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000002dc0), 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r0, &(0x7f0000000640)="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", 0x17d, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 03:18:35 executing program 5: 03:18:36 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:36 executing program 3: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x11000, 0x0, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1776}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='.+lgroup/\r\x85\xdc\xb0|\x03>@H\x03%\xde\x00\x04\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000540), 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000006c0)=@pppoe={0x18, 0x0, {0x2, @random="1250c8010805", 'ba\xd1\xbcj\x94\x86\xb2\xf8@\x00\x00\x00\x00\x00\t'}}, 0x80, 0x0}, 0x4088) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'tunl0\x00'}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x20000, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x410, 0x0, 0xffffffff, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x3}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r3, 0xffffffffffffff23, &(0x7f0000000500)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r4}, 0x44) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={r4}, 0xc) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={r4, 0x7fff, 0x8}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000440)={r5, &(0x7f00000002c0)="74411fed71c819ab98dbe0bd72ad9dc50574f1dbffa19448ee8d565b4840d767b4fc4f8b7cbb22ead1e4a9c431ee7a4b0607e5c69e1915dbeb48018364927238ec5998050f3fcaad5014a62202f8d00b8738dd43c251834a5a6a2e7728806ae4287f49e0e7bc3adb3b029fc87fb2febdb55b08b538051c9808545f91dcbd358cac24354b9d24e3d262878e265062ef6f8d90c5aabb7e9c411221b51b4db4d8fa8baf37f79c7697dbb9be0e0ad9618f990860dc3312cde3623d558b50bcf3ab92ee687ac4fd866385fc2666c28b3539cbb4ed7c63a549738080e2d58387dc66014910eed415", &(0x7f00000003c0)=""/104, 0x4}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\xff', 0x1ff) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000140)='./file0\x00'}, 0x10) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000240)=r6) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x20b, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008108040f80ecdb4cb92e0a480e001a000000e8bd6efb120009000e0002000c0000ff050005001204", 0x2e}], 0x1}, 0x0) r7 = gettid() r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(0x0, r7, 0x7, r8, 0x2) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0xba, 0x800, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1000000, 0x0, @perf_bp={&(0x7f0000000180)}, 0x800, 0xaacd, 0x0, 0x0, 0x0, 0x2, 0x20}, r7, 0x8, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x8}, r7, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x11) perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) r9 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open$cgroup(0x0, r9, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0x29, 0x1, 0x0) sendmsg$kcm(r10, &(0x7f0000000080)={&(0x7f0000000100)=@ethernet={0x1, @random="06e5596b0f8a"}, 0xfffffeb8, &(0x7f00000008c0), 0x7, &(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1297}, 0x4000000) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:18:36 executing program 5: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x11000, 0x0, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1776}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='.+lgroup/\r\x85\xdc\xb0|\x03>@H\x03%\xde\x00\x04\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000540), 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000006c0)=@pppoe={0x18, 0x0, {0x2, @random="1250c8010805", 'ba\xd1\xbcj\x94\x86\xb2\xf8@\x00\x00\x00\x00\x00\t'}}, 0x80, 0x0}, 0x4088) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'tunl0\x00'}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x20000, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x410, 0x0, 0xffffffff, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x3}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r3, 0xffffffffffffff23, &(0x7f0000000500)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r4}, 0x44) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={r4}, 0xc) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={r4, 0x7fff, 0x8}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000440)={r5, &(0x7f00000002c0)="74411fed71c819ab98dbe0bd72ad9dc50574f1dbffa19448ee8d565b4840d767b4fc4f8b7cbb22ead1e4a9c431ee7a4b0607e5c69e1915dbeb48018364927238ec5998050f3fcaad5014a62202f8d00b8738dd43c251834a5a6a2e7728806ae4287f49e0e7bc3adb3b029fc87fb2febdb55b08b538051c9808545f91dcbd358cac24354b9d24e3d262878e265062ef6f8d90c5aabb7e9c411221b51b4db4d8fa8baf37f79c7697dbb9be0e0ad9618f990860dc3312cde3623d558b50bcf3ab92ee687ac4fd866385fc2666c28b3539cbb4ed7c63a549738080e2d58387dc66014910eed415", &(0x7f00000003c0)=""/104, 0x4}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\xff', 0x1ff) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000140)='./file0\x00'}, 0x10) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000240)=r6) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x20b, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008108040f80ecdb4cb92e0a480e001a000000e8bd6efb120009000e0002000c0000ff050005001204", 0x2e}], 0x1}, 0x0) r7 = gettid() r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(0x0, r7, 0x7, r8, 0x2) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0xba, 0x800, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1000000, 0x0, @perf_bp={&(0x7f0000000180)}, 0x800, 0xaacd, 0x0, 0x0, 0x0, 0x2, 0x20}, r7, 0x8, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x8}, r7, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x11) perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) r9 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open$cgroup(0x0, r9, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0x29, 0x1, 0x0) sendmsg$kcm(r10, &(0x7f0000000080)={&(0x7f0000000100)=@ethernet={0x1, @random="06e5596b0f8a"}, 0xfffffeb8, &(0x7f00000008c0), 0x7, &(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1297}, 0x4000000) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:18:36 executing program 0: mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 03:18:36 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001340)=[{&(0x7f00000010c0)=""/246, 0xf6}, {0x0}], 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xa1720495f3f7edd, 0x0, 0x0, 0x800e00516) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r2, 0xffff, 0x1006, &(0x7f0000000000)={0x9}, 0x10) shutdown(0xffffffffffffffff, 0x0) recvfrom$inet(r2, 0x0, 0x893f, 0x0, 0x0, 0x800e00519) shutdown(r1, 0x0) shutdown(r2, 0x0) 03:18:36 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:36 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:36 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0b") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:36 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x400, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000200), 0xc) connect$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) socket(0x0, 0x803, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000dc0)=[{0x0}], 0x1, 0x81808) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) write(0xffffffffffffffff, &(0x7f0000cc2fed), 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r1, &(0x7f0000000640)="3232ce2774e7a3797748648df71c7b4542839e347be35844e42ad67454cd5e140e0ab73493d6b6921681e5536dbc0f309747cc199a7f9a20d01e04d55fb1c26504e3e4738aac76780b5c2363a6dc4d10fe9adc2b363abf6981a31f6a58ef2103e7a145b11649eac6d4cc29a315faf899c2e35d08b1974199c08bf4798207b78d8dd89e727382318265acc85a4444869dfc22ba7fd79b455635a715fa1e705070e2857ef21a3076cdfc2c29b26547360add94ef9c349ae62f54e7a90e1aae762a11b2cc6bd720034fac41f1de628e2a3166ec21e03c68a60708328e1606a83211bc78be7909", 0xe5, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 03:18:36 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000000200)={{0xff}, {0x1}}) 03:18:36 executing program 3: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x11000, 0x0, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1776}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='.+lgroup/\r\x85\xdc\xb0|\x03>@H\x03%\xde\x00\x04\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000540), 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000006c0)=@pppoe={0x18, 0x0, {0x2, @random="1250c8010805", 'ba\xd1\xbcj\x94\x86\xb2\xf8@\x00\x00\x00\x00\x00\t'}}, 0x80, 0x0}, 0x4088) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'tunl0\x00'}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x20000, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x410, 0x0, 0xffffffff, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x3}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r3, 0xffffffffffffff23, &(0x7f0000000500)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r4}, 0x44) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={r4}, 0xc) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={r4, 0x7fff, 0x8}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000440)={r5, &(0x7f00000002c0)="74411fed71c819ab98dbe0bd72ad9dc50574f1dbffa19448ee8d565b4840d767b4fc4f8b7cbb22ead1e4a9c431ee7a4b0607e5c69e1915dbeb48018364927238ec5998050f3fcaad5014a62202f8d00b8738dd43c251834a5a6a2e7728806ae4287f49e0e7bc3adb3b029fc87fb2febdb55b08b538051c9808545f91dcbd358cac24354b9d24e3d262878e265062ef6f8d90c5aabb7e9c411221b51b4db4d8fa8baf37f79c7697dbb9be0e0ad9618f990860dc3312cde3623d558b50bcf3ab92ee687ac4fd866385fc2666c28b3539cbb4ed7c63a549738080e2d58387dc66014910eed415", &(0x7f00000003c0)=""/104, 0x4}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\xff', 0x1ff) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000140)='./file0\x00'}, 0x10) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000240)=r6) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x20b, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008108040f80ecdb4cb92e0a480e001a000000e8bd6efb120009000e0002000c0000ff050005001204", 0x2e}], 0x1}, 0x0) r7 = gettid() r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(0x0, r7, 0x7, r8, 0x2) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0xba, 0x800, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1000000, 0x0, @perf_bp={&(0x7f0000000180)}, 0x800, 0xaacd, 0x0, 0x0, 0x0, 0x2, 0x20}, r7, 0x8, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x8}, r7, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x11) perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) r9 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open$cgroup(0x0, r9, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0x29, 0x1, 0x0) sendmsg$kcm(r10, &(0x7f0000000080)={&(0x7f0000000100)=@ethernet={0x1, @random="06e5596b0f8a"}, 0xfffffeb8, &(0x7f00000008c0), 0x7, &(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1297}, 0x4000000) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:18:36 executing program 0: mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 03:18:36 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:36 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0b") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2, 0x0, 0x0, 0xfffffffd}, [@call={0x85, 0x0, 0x0, 0x2c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x26c, 0x0, &(0x7f0000000080)="020043d05d25b666cd783f4b231c", 0x0, 0x8e}, 0x28) bpf$PROG_LOAD(0x5, 0x0, 0x0) 03:18:36 executing program 4: 03:18:36 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0b") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:36 executing program 5: 03:18:36 executing program 4: 03:18:36 executing program 0: mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 03:18:36 executing program 5: 03:18:36 executing program 4: 03:18:37 executing program 3: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x11000, 0x0, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1776}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='.+lgroup/\r\x85\xdc\xb0|\x03>@H\x03%\xde\x00\x04\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000540), 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000006c0)=@pppoe={0x18, 0x0, {0x2, @random="1250c8010805", 'ba\xd1\xbcj\x94\x86\xb2\xf8@\x00\x00\x00\x00\x00\t'}}, 0x80, 0x0}, 0x4088) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'tunl0\x00'}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x20000, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x410, 0x0, 0xffffffff, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x3}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r3, 0xffffffffffffff23, &(0x7f0000000500)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r4}, 0x44) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={r4}, 0xc) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={r4, 0x7fff, 0x8}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000440)={r5, &(0x7f00000002c0)="74411fed71c819ab98dbe0bd72ad9dc50574f1dbffa19448ee8d565b4840d767b4fc4f8b7cbb22ead1e4a9c431ee7a4b0607e5c69e1915dbeb48018364927238ec5998050f3fcaad5014a62202f8d00b8738dd43c251834a5a6a2e7728806ae4287f49e0e7bc3adb3b029fc87fb2febdb55b08b538051c9808545f91dcbd358cac24354b9d24e3d262878e265062ef6f8d90c5aabb7e9c411221b51b4db4d8fa8baf37f79c7697dbb9be0e0ad9618f990860dc3312cde3623d558b50bcf3ab92ee687ac4fd866385fc2666c28b3539cbb4ed7c63a549738080e2d58387dc66014910eed415", &(0x7f00000003c0)=""/104, 0x4}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\xff', 0x1ff) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000140)='./file0\x00'}, 0x10) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000240)=r6) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x20b, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008108040f80ecdb4cb92e0a480e001a000000e8bd6efb120009000e0002000c0000ff050005001204", 0x2e}], 0x1}, 0x0) r7 = gettid() r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(0x0, r7, 0x7, r8, 0x2) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0xba, 0x800, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1000000, 0x0, @perf_bp={&(0x7f0000000180)}, 0x800, 0xaacd, 0x0, 0x0, 0x0, 0x2, 0x20}, r7, 0x8, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x8}, r7, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x11) perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) r9 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open$cgroup(0x0, r9, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0x29, 0x1, 0x0) sendmsg$kcm(r10, &(0x7f0000000080)={&(0x7f0000000100)=@ethernet={0x1, @random="06e5596b0f8a"}, 0xfffffeb8, &(0x7f00000008c0), 0x7, &(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1297}, 0x4000000) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:18:37 executing program 5: 03:18:37 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:37 executing program 4: 03:18:37 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:37 executing program 0: mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 03:18:37 executing program 5: 03:18:37 executing program 4: 03:18:37 executing program 5: 03:18:37 executing program 3: 03:18:37 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:37 executing program 5: 03:18:37 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:37 executing program 3: 03:18:37 executing program 0: mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 03:18:37 executing program 4: 03:18:37 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:37 executing program 3: 03:18:37 executing program 4: 03:18:37 executing program 0: mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 03:18:37 executing program 5: 03:18:37 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b30") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:37 executing program 3: 03:18:37 executing program 4: [ 1615.064351][T13138] IPVS: ftp: loaded support on port[0] = 21 [ 1615.149696][T13138] chnl_net:caif_netlink_parms(): no params data found [ 1615.197434][T13138] bridge0: port 1(bridge_slave_0) entered blocking state [ 1615.205805][T13138] bridge0: port 1(bridge_slave_0) entered disabled state [ 1615.214987][T13138] device bridge_slave_0 entered promiscuous mode [ 1615.223718][T13138] bridge0: port 2(bridge_slave_1) entered blocking state [ 1615.230864][T13138] bridge0: port 2(bridge_slave_1) entered disabled state [ 1615.239360][T13138] device bridge_slave_1 entered promiscuous mode [ 1615.262336][T13138] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1615.274877][T13138] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1615.299187][T13138] team0: Port device team_slave_0 added [ 1615.307609][T13138] team0: Port device team_slave_1 added [ 1615.362683][T13138] device hsr_slave_0 entered promiscuous mode [ 1615.404094][T13138] device hsr_slave_1 entered promiscuous mode [ 1615.443676][T13138] debugfs: Directory 'hsr0' with parent '/' already present! [ 1615.465107][T13138] bridge0: port 2(bridge_slave_1) entered blocking state [ 1615.472449][T13138] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1615.479844][T13138] bridge0: port 1(bridge_slave_0) entered blocking state [ 1615.486976][T13138] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1615.542820][T13138] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1615.565455][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1615.574661][T30581] bridge0: port 1(bridge_slave_0) entered disabled state [ 1615.582852][T30581] bridge0: port 2(bridge_slave_1) entered disabled state [ 1615.592127][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1615.608279][T13138] 8021q: adding VLAN 0 to HW filter on device team0 [ 1615.620334][T16059] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1615.629446][T16059] bridge0: port 1(bridge_slave_0) entered blocking state [ 1615.636570][T16059] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1615.655810][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1615.666041][T30581] bridge0: port 2(bridge_slave_1) entered blocking state [ 1615.673085][T30581] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1615.685476][T31123] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1615.714644][T31123] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1615.722880][T31123] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1615.731961][T31123] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1615.746460][T31123] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1615.757855][T13138] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1615.780849][T31123] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1615.789520][T31123] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1615.803256][T13138] 8021q: adding VLAN 0 to HW filter on device batadv0 03:18:40 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:40 executing program 0: mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 03:18:40 executing program 5: 03:18:40 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b30") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:40 executing program 4: 03:18:40 executing program 3: 03:18:40 executing program 3: 03:18:40 executing program 4: 03:18:40 executing program 5: 03:18:40 executing program 0: mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 03:18:40 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b30") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:40 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:41 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x401c005, 0x0, 0x0) 03:18:41 executing program 4: 03:18:41 executing program 0: mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 03:18:41 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:41 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:41 executing program 4: 03:18:41 executing program 5: 03:18:41 executing program 0: mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 03:18:41 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:41 executing program 4: creat(0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) 03:18:41 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:41 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:41 executing program 5: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) 03:18:41 executing program 0: clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 03:18:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440), 0xffe6) 03:18:43 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:43 executing program 0: clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 03:18:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000a0cff4)={0x4400000010, 0x0, 0x0, 0x70a0}, 0xc) getsockopt$netlink(r0, 0x10e, 0x8000000009, 0x0, &(0x7f0000000100)) 03:18:43 executing program 5: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) 03:18:43 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:43 executing program 4: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r1 = creat(0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x200000, 0x60) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000005c0)=ANY=[@ANYBLOB]) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000280)=""/117) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2cf7a6a2, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e20, @remote}, 0x10) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000001c0)) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendto$inet(r2, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') getuid() 03:18:43 executing program 0: clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) [ 1619.071484][T13633] IPVS: ftp: loaded support on port[0] = 21 [ 1619.166833][T13633] chnl_net:caif_netlink_parms(): no params data found [ 1619.216788][T13633] bridge0: port 1(bridge_slave_0) entered blocking state [ 1619.224126][T13633] bridge0: port 1(bridge_slave_0) entered disabled state [ 1619.232456][T13633] device bridge_slave_0 entered promiscuous mode [ 1619.241124][T13633] bridge0: port 2(bridge_slave_1) entered blocking state [ 1619.249005][T13633] bridge0: port 2(bridge_slave_1) entered disabled state [ 1619.257418][T13633] device bridge_slave_1 entered promiscuous mode [ 1619.282258][T13633] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1619.294934][T13633] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1619.320580][T13633] team0: Port device team_slave_0 added [ 1619.329665][T13633] team0: Port device team_slave_1 added [ 1619.389686][T13633] device hsr_slave_0 entered promiscuous mode [ 1619.443955][T13633] device hsr_slave_1 entered promiscuous mode [ 1619.483646][T13633] debugfs: Directory 'hsr0' with parent '/' already present! [ 1619.555104][T13633] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1619.571616][T31123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1619.581202][T31123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1619.596142][T13633] 8021q: adding VLAN 0 to HW filter on device team0 [ 1619.612703][T31123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1619.622958][T31123] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1619.637980][T31123] bridge0: port 1(bridge_slave_0) entered blocking state [ 1619.645209][T31123] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1619.654716][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1619.675102][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1619.684783][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1619.693214][T30581] bridge0: port 2(bridge_slave_1) entered blocking state [ 1619.700431][T30581] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1619.723575][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1619.732242][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1619.740961][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1619.750312][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1619.759548][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1619.769309][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1619.780921][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1619.792944][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1619.802809][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1619.824876][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1619.833870][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1619.845504][T13633] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1619.874010][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1619.881678][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1619.894682][T13633] 8021q: adding VLAN 0 to HW filter on device batadv0 03:18:44 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:44 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="535252c67fe735ea3b6c9e58f849a0612151b428159f22c67150d90a69a7d6741665f84da747662935e9c0dfa5980be5e550d89cf9de0ec7aec7fc4f3b24dcc379e31085563b16dc3593912622281160a729d61aee02ae2e197f9dcc98a84063fc301c796271393a03f0cac280ac6afea8cbaa712c66916e98319c26f9851d9923d5356a87258e020e895b39c8e3e3fd4715908ea63c7711085f60559b2b6f54dc0ab1392b5b5e4e7b39bb77bf80ab2ee61407814778d29c8f9c4cf7d810e125c9d087b1a25dc5dc2514afc368749179a3c0a0c6fda39b0de60fa612f3147a", 0xdf}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:44 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 03:18:44 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:44 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0x0, 0x6, 0xdf}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0/file0\x00', &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) truncate(&(0x7f0000000100)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) 03:18:44 executing program 5: ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) 03:18:44 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 03:18:44 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:44 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_int(r0, 0x0, 0x31, 0x0, 0x0) 03:18:45 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 03:18:45 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xef, 0x209e21, 0x100008000000001, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f00000000c0), &(0x7f0000000180)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f00000000c0), &(0x7f00000000c0)}, 0x20) 03:18:45 executing program 0: mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x0) 03:18:45 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) [ 1622.268332][T13980] IPVS: ftp: loaded support on port[0] = 21 [ 1622.362883][T13980] chnl_net:caif_netlink_parms(): no params data found [ 1622.399665][T13980] bridge0: port 1(bridge_slave_0) entered blocking state [ 1622.407116][T13980] bridge0: port 1(bridge_slave_0) entered disabled state [ 1622.417983][T13980] device bridge_slave_0 entered promiscuous mode [ 1622.426854][T13980] bridge0: port 2(bridge_slave_1) entered blocking state [ 1622.434992][T13980] bridge0: port 2(bridge_slave_1) entered disabled state [ 1622.449870][T13980] device bridge_slave_1 entered promiscuous mode [ 1622.477918][T13980] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1622.504204][T13980] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1622.542169][T13980] team0: Port device team_slave_0 added [ 1622.569858][T13980] team0: Port device team_slave_1 added [ 1622.625666][T13980] device hsr_slave_0 entered promiscuous mode [ 1622.694753][T13980] device hsr_slave_1 entered promiscuous mode [ 1622.743460][T13980] debugfs: Directory 'hsr0' with parent '/' already present! [ 1622.768098][T13980] bridge0: port 2(bridge_slave_1) entered blocking state [ 1622.775501][T13980] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1622.783642][T13980] bridge0: port 1(bridge_slave_0) entered blocking state [ 1622.790938][T13980] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1622.851220][T13980] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1622.871570][T16059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1622.882159][T16059] bridge0: port 1(bridge_slave_0) entered disabled state [ 1622.893890][T16059] bridge0: port 2(bridge_slave_1) entered disabled state [ 1622.907661][T16059] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1622.924728][T13980] 8021q: adding VLAN 0 to HW filter on device team0 [ 1622.967345][T15394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1622.977655][T15394] bridge0: port 1(bridge_slave_0) entered blocking state [ 1622.987944][T15394] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1622.998462][T15394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1623.007985][T15394] bridge0: port 2(bridge_slave_1) entered blocking state [ 1623.016239][T15394] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1623.044370][T16059] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1623.060153][T16059] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1623.075286][T16059] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1623.091953][T13980] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1623.106455][T13980] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1623.122958][ T4261] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1623.133186][ T4261] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1623.156439][T16059] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1623.171356][T13980] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1623.180240][ T4261] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1623.191391][ T4261] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 03:18:48 executing program 3: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = creat(0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000280)=""/117) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2cf7a6a2, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @remote}, 0x10) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) sendto$inet(r1, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) connect$inet(0xffffffffffffffff, 0x0, 0x0) getuid() 03:18:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) r0 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xff) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) fcntl$getflags(0xffffffffffffffff, 0x401) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) sigaltstack(&(0x7f0000001000/0x2000)=nil, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/100, 0x64}, {&(0x7f0000000340)=""/180, 0xb4}, {&(0x7f0000000240)=""/12, 0xc}, {&(0x7f0000000400)=""/249, 0xf9}], 0x5}}, {{&(0x7f0000000680)=@rc, 0x80, &(0x7f0000003180)=[{&(0x7f0000000700)=""/66, 0x42}, {&(0x7f0000001fc0)=""/4096, 0x1000}, {&(0x7f0000000780)=""/134, 0x86}, {&(0x7f0000000980)=""/100, 0x64}, {&(0x7f0000000a00)=""/131, 0x83}, {&(0x7f0000002fc0)=""/216, 0xd8}, {&(0x7f00000030c0)=""/129, 0x81}], 0x7}, 0x1}, {{&(0x7f0000003240)=@can, 0x80, 0x0, 0x0, &(0x7f0000004540)=""/199, 0xc7}, 0x8}], 0x3, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) iopl(0x0) sched_setattr(0x0, 0x0, 0x0) 03:18:48 executing program 0: mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x0) 03:18:48 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:48 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_int(r0, 0x0, 0x31, &(0x7f0000000240), 0x4) 03:18:48 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x0, &(0x7f00000008c0), 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3c00000010003b0e00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010069706970000000000c0002000800040008000000"], 0x3c}}, 0x0) 03:18:48 executing program 0: mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x0) 03:18:48 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r3 = dup2(r2, r2) shutdown(r3, 0x0) recvmmsg(r3, &(0x7f0000000000), 0x400000000000119, 0x0, 0x0) 03:18:48 executing program 0: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) close(r3) [ 1624.135671][T14103] netlink: 'syz-executor.5': attribute type 4 has an invalid length. 03:18:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x20, 0x10, 0x801}, 0x20}}, 0x0) 03:18:49 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') mknod(&(0x7f0000000100)='./file0\x00', 0x1000, 0x0) 03:18:49 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @remote}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x50, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x28, 0x1a, [{0x4, 0x2}, {0xfffffffffffffe2c}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0xfffffffffffffdc2}]}, @IFLA_GROUP={0x8}]}, 0x50}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setuid(0x0) 03:18:49 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:49 executing program 0: r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) open(&(0x7f0000000380)='./file0/file0\x00', 0xf0, 0x0) renameat2(r0, &(0x7f0000000140)='./file0/file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x1) 03:18:49 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) [ 1624.655601][T14324] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1624.752718][T14324] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1624.768987][T14324] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1624.876001][T14324] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1624.906065][T14324] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1624.914874][T14324] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1625.895397][T14540] IPVS: ftp: loaded support on port[0] = 21 [ 1626.000774][T14540] chnl_net:caif_netlink_parms(): no params data found [ 1626.035685][T14540] bridge0: port 1(bridge_slave_0) entered blocking state [ 1626.042966][T14540] bridge0: port 1(bridge_slave_0) entered disabled state [ 1626.058462][T14540] device bridge_slave_0 entered promiscuous mode [ 1626.068506][T14540] bridge0: port 2(bridge_slave_1) entered blocking state [ 1626.077306][T14540] bridge0: port 2(bridge_slave_1) entered disabled state [ 1626.086237][T14540] device bridge_slave_1 entered promiscuous mode [ 1626.116281][T14540] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1626.128400][T14540] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1626.159478][T14540] team0: Port device team_slave_0 added [ 1626.167147][T14540] team0: Port device team_slave_1 added [ 1626.219447][T14540] device hsr_slave_0 entered promiscuous mode [ 1626.264044][T14540] device hsr_slave_1 entered promiscuous mode [ 1626.303512][T14540] debugfs: Directory 'hsr0' with parent '/' already present! [ 1626.328317][T14540] bridge0: port 2(bridge_slave_1) entered blocking state [ 1626.335543][T14540] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1626.343460][T14540] bridge0: port 1(bridge_slave_0) entered blocking state [ 1626.350633][T14540] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1626.411186][T14540] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1626.443034][ T8237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1626.454310][ T8237] bridge0: port 1(bridge_slave_0) entered disabled state [ 1626.464130][ T8237] bridge0: port 2(bridge_slave_1) entered disabled state [ 1626.475945][ T8237] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1626.492317][T14540] 8021q: adding VLAN 0 to HW filter on device team0 [ 1626.520229][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1626.530315][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 1626.537452][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1626.556487][T15394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1626.566046][T15394] bridge0: port 2(bridge_slave_1) entered blocking state [ 1626.573889][T15394] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1626.599413][T15394] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1626.629451][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1626.638791][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1626.647607][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1626.656780][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1626.668872][T14540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1626.701004][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1626.710619][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1626.727760][T14540] 8021q: adding VLAN 0 to HW filter on device batadv0 03:18:51 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x0, &(0x7f00000008c0), 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:18:51 executing program 3: syz_emit_ethernet(0x11, &(0x7f0000000000)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @dev, [], {@llc_tr={0x11, {@llc={0x0, 0x0, '~'}}}}}, 0x0) 03:18:51 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f00000004c0)=0x1e, 0x4) r2 = socket$netlink(0x10, 0x3, 0x8000000004) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040)=0x16, 0x4) writev(r2, &(0x7f00000002c0)=[{&(0x7f0000000300)="580000001400192340834b80043f679a10ffff7f4e32f61b26a054e8b0f23d12cdf1e422000000000100804824ca945f64009400050028925aaa000000000000008400f0ff00ff050000000010000100090ac2d00b0ccbd8", 0x58}], 0x1) 03:18:51 executing program 4: socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x8000000004) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x16, 0x4) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000300)="580000001400192340834b80043f679a10ffff7f4e32f61b26a054e8b0f23d12cdf1e422000000000100804824ca945f64009400050028925aaa000000000000008400f0ff00ff050000000010000100090ac2d00b0ccbd8", 0x58}], 0x1) 03:18:51 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:51 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @remote}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x50, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x28, 0x1a, [{0x4, 0x2}, {0xfffffffffffffe2c}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0xfffffffffffffdc2}]}, @IFLA_GROUP={0x8}]}, 0x50}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setuid(0x0) 03:18:51 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:51 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) ioctl$SIOCAX25DELUID(r0, 0x89ea, 0x0) 03:18:52 executing program 4: socket$inet6(0xa, 0x0, 0x6b) ioctl(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x8000000004) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x16, 0x4) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000300)="580000001400192340834b80043f679a10ffff7f4e32f61b26a054e8b0f23d12cdf1e422000000000100804824ca945f64009400050028925aaa000000000000008400f0ff00ff050000000010000100090ac2d00b0ccbd8", 0x58}], 0x1) 03:18:52 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f0000000040)="a2e6fa9a", 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0x190, 0x4) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendto$inet6(r0, &(0x7f0000000100)="ce03100001000100ff901efc9fb35c22cc6dc30000000000000f", 0x1a, 0x0, 0x0, 0x0) 03:18:52 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r1, 0x8038550a, &(0x7f0000000040)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000)={0xa1}, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 1627.722101][T14558] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1627.765762][T14558] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 03:18:52 executing program 4: syz_emit_ethernet(0x16, &(0x7f0000000340)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @dev, [], {@llc_tr={0x11, {@snap={0x0, 0x0, "e5", "7d72c4"}}}}}, 0x0) [ 1627.822784][T14558] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1627.832134][T15087] usb usb2: usbfs: process 15087 (syz-executor.0) did not claim interface 0 before use 03:18:52 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x0, &(0x7f00000008c0), 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) [ 1629.434589][T15097] IPVS: ftp: loaded support on port[0] = 21 [ 1629.535838][T15097] chnl_net:caif_netlink_parms(): no params data found [ 1629.585933][T15097] bridge0: port 1(bridge_slave_0) entered blocking state [ 1629.600260][T15097] bridge0: port 1(bridge_slave_0) entered disabled state [ 1629.611620][T15097] device bridge_slave_0 entered promiscuous mode [ 1629.621583][T15097] bridge0: port 2(bridge_slave_1) entered blocking state [ 1629.629262][T15097] bridge0: port 2(bridge_slave_1) entered disabled state [ 1629.638294][T15097] device bridge_slave_1 entered promiscuous mode [ 1629.670205][T15097] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1629.683878][T15097] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1629.717659][T15097] team0: Port device team_slave_0 added [ 1629.726972][T15097] team0: Port device team_slave_1 added [ 1629.786851][T15097] device hsr_slave_0 entered promiscuous mode [ 1629.824102][T15097] device hsr_slave_1 entered promiscuous mode [ 1629.863691][T15097] debugfs: Directory 'hsr0' with parent '/' already present! [ 1629.890581][T15097] bridge0: port 2(bridge_slave_1) entered blocking state [ 1629.897722][T15097] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1629.905337][T15097] bridge0: port 1(bridge_slave_0) entered blocking state [ 1629.912632][T15097] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1629.982847][T15097] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1630.007072][T16059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1630.017258][T16059] bridge0: port 1(bridge_slave_0) entered disabled state [ 1630.026053][T16059] bridge0: port 2(bridge_slave_1) entered disabled state [ 1630.036821][T16059] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1630.053861][T15097] 8021q: adding VLAN 0 to HW filter on device team0 [ 1630.068085][ T4261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1630.077259][ T4261] bridge0: port 1(bridge_slave_0) entered blocking state [ 1630.084381][ T4261] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1630.099589][T15394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1630.108809][T15394] bridge0: port 2(bridge_slave_1) entered blocking state [ 1630.116147][T15394] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1630.145936][ T8237] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1630.167178][T15394] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1630.180559][T15394] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1630.190389][T15394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1630.206432][T15097] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1630.218469][T15097] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1630.229915][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1630.257136][T15394] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1630.265168][T15394] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1630.275918][T15097] 8021q: adding VLAN 0 to HW filter on device batadv0 03:18:55 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @rand_addr=0x6}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffec1, 0xfffffffffbffffb9, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) r1 = socket(0x100000000018, 0x0, 0x4) dup3(r0, r1, 0x0) r2 = memfd_create(&(0x7f0000000b80)='-\'\x00\x10\f\xdex\xf5\a\xd91\xc4dT\x12P\xc6n\x0e\x83\xe7\x1b\xbd\xa5\xb4\xc2H\r\xe1\x8e[\xd6\x11\xfb\xfe&\xd2\x18\x88\x97\xea\x8eD\"\x9a\xfbpk\x18\xcb\xb3rR`\xa4\xbbzM\x84\xfb\xbd\xe3c\xe09\xd0\xc4\t\xaf\bC\x81\xb7\x05E\x8c7.\xeb+\x1c\xb4\xfdli\\\x8a$\x84\xe3\x06-61\x13\xeb\xc9\xb8\xe4\xea\aSs\rqM\xbbQ\xa6o\x9e!S\x17`\x18V\xbe\xb8N\xad\r9\x15\x8f\x92\x9b\'\xb7\xf2j\xa16\x04w\xc3\f0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) syz_open_procfs(0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/tcp6\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x879, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) fcntl$setpipe(r1, 0x407, 0x0) 03:18:55 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:55 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x6, 0x4, 0x200, 0x80000000000004, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) 03:18:55 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_netdev_private(r1, 0x89fa, &(0x7f0000000000)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) wait4(0x0, 0x0, 0x0, 0x0) 03:18:55 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:18:55 executing program 4: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_netdev_private(r0, 0x89fa, &(0x7f0000000000)) 03:18:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) r0 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xff) open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) fcntl$getflags(0xffffffffffffffff, 0x401) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) sigaltstack(&(0x7f0000001000/0x2000)=nil, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/100, 0x64}, {&(0x7f0000000340)=""/180, 0xb4}, {&(0x7f0000000240)=""/12, 0xc}], 0x4}}, {{&(0x7f0000000680)=@rc, 0x80, &(0x7f0000003180)=[{&(0x7f0000000700)=""/66, 0x42}, {&(0x7f0000001fc0)=""/4096, 0x1000}, {&(0x7f0000000780)=""/134, 0x86}, {&(0x7f00000008c0)=""/63, 0x3f}, {&(0x7f0000000980)=""/100, 0x64}, {&(0x7f0000000a00)=""/131, 0x83}, {&(0x7f0000002fc0)=""/216, 0xd8}, {&(0x7f00000030c0)=""/129, 0x81}], 0x8}, 0x1}, {{&(0x7f0000003240)=@can, 0x80, 0x0, 0x0, &(0x7f0000004540)=""/199, 0xc7}, 0x8}], 0x3, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) iopl(0x0) sched_setattr(0x0, 0x0, 0x0) [ 1630.917984][T15254] ptrace attach of "/root/syz-executor.3"[15253] was attempted by "/root/syz-executor.3"[15254] 03:18:55 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$alg(r1, &(0x7f00000000c0)=[{0x0, 0xff00, 0x0, 0x0, &(0x7f0000002780)=[@op={0x18, 0x29, 0x3b}], 0x18}], 0x146, 0x0) 03:18:55 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) [ 1631.079367][T15317] device lo left promiscuous mode 03:18:55 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r0, 0x0) exit(0x0) futex(0x0, 0x0, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) 03:18:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f00000016c0)={0x0, 0x0, &(0x7f00000027c0)=[{&(0x7f0000000100)=""/69, 0x45}, {&(0x7f0000000040)=""/74, 0x4a}, {&(0x7f0000001500)=""/153, 0x99}, {&(0x7f0000002840)=""/4090, 0xffa}, {&(0x7f00000015c0)=""/162, 0xa2}, {&(0x7f0000000840)=""/195, 0xc3}], 0x6}, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)={0x14, 0x42, 0x105}, 0x14}}, 0x0) [ 1634.315425][T15317] bridge0: port 2(bridge_slave_1) entered disabled state [ 1634.322790][T15317] bridge0: port 1(bridge_slave_0) entered disabled state [ 1639.239941][T15504] IPVS: ftp: loaded support on port[0] = 21 [ 1639.486096][T15504] chnl_net:caif_netlink_parms(): no params data found [ 1639.549903][T15504] bridge0: port 1(bridge_slave_0) entered blocking state [ 1639.557398][T15504] bridge0: port 1(bridge_slave_0) entered disabled state [ 1639.566119][T15504] device bridge_slave_0 entered promiscuous mode [ 1639.574849][T15504] bridge0: port 2(bridge_slave_1) entered blocking state [ 1639.581997][T15504] bridge0: port 2(bridge_slave_1) entered disabled state [ 1639.590987][T15504] device bridge_slave_1 entered promiscuous mode [ 1639.618813][T15504] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1639.631273][T15504] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1639.656716][T15504] team0: Port device team_slave_0 added [ 1639.669802][T15504] team0: Port device team_slave_1 added [ 1639.715851][T15504] device hsr_slave_0 entered promiscuous mode [ 1639.744267][T15504] device hsr_slave_1 entered promiscuous mode [ 1639.783971][T15504] debugfs: Directory 'hsr0' with parent '/' already present! [ 1640.542390][T15504] bridge0: port 2(bridge_slave_1) entered blocking state [ 1640.549665][T15504] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1640.557204][T15504] bridge0: port 1(bridge_slave_0) entered blocking state [ 1640.564670][T15504] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1640.576668][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 1640.585590][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 1640.644951][T15504] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1640.659565][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1640.671914][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1640.683580][T15504] 8021q: adding VLAN 0 to HW filter on device team0 [ 1640.693969][ T4262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1640.702765][ T4262] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1640.723873][ T4262] bridge0: port 1(bridge_slave_0) entered blocking state [ 1640.731075][ T4262] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1640.748049][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1640.757424][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1640.768013][T30581] bridge0: port 2(bridge_slave_1) entered blocking state [ 1640.775269][T30581] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1640.793735][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1640.802734][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1640.811674][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1640.821554][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1640.831748][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1640.843793][ T8237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1640.852461][ T8237] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1640.882000][T15504] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1640.892767][T15504] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1640.906262][ T4262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1640.915673][ T4262] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1640.924861][ T4262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1640.933227][ T4262] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1640.956506][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1640.965229][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1640.973043][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1640.989723][T15504] 8021q: adding VLAN 0 to HW filter on device batadv0 03:19:05 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{0x0, 0x0, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:19:05 executing program 4: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@updpolicy={0xc8, 0x19, 0x0, 0x0, 0x0, {{@in=@broadcast, @in=@loopback}}, [@sec_ctx={0x10, 0x8, {0xa, 0x8, 0x0, 0x0, 0x2, 'kD'}}]}, 0xc8}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d8214) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 03:19:05 executing program 0: ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x107fffffff) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x879, 0x0) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) fcntl$setpipe(r1, 0x407, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 03:19:05 executing program 3: clone(0x0, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000200)='./file0\x00', 0x27e, 0x0) 03:19:05 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:19:05 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b31afdc1338d544", 0x38}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="380000001e0009010c0000810000000007003401000000000800bec00049000018000a00"], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 1641.223013][T15529] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 03:19:05 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:19:05 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b31afdc1338d544", 0x38}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="380000001e0009010c0000810000000007003401000000000800bec00049000018000a00"], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 03:19:06 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 03:19:06 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001500)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001540)=[{r1}], 0x1, &(0x7f0000001580)={0x0, 0x1c9c380}, 0x0, 0x0) 03:19:06 executing program 0: ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x107fffffff) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x879, 0x0) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) fcntl$setpipe(r1, 0x407, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 03:19:06 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) [ 1641.772877][T15646] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1641.929449][T15855] ================================================================== [ 1641.938063][T15855] BUG: KASAN: slab-out-of-bounds in pipe_write+0x579/0x1130 [ 1641.945450][T15855] Write of size 8 at addr ffff888095f48ba8 by task syz-executor.0/15855 [ 1641.953766][T15855] [ 1641.956098][T15855] CPU: 1 PID: 15855 Comm: syz-executor.0 Not tainted 5.4.0-syzkaller #0 [ 1641.964443][T15855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1641.974762][T15855] Call Trace: [ 1641.978147][T15855] dump_stack+0x1fb/0x318 [ 1641.982671][T15855] print_address_description+0x75/0x5c0 [ 1641.988231][T15855] ? vprintk_default+0x28/0x30 [ 1641.993545][T15855] ? vprintk_func+0x158/0x170 [ 1641.998332][T15855] ? printk+0x62/0x8d [ 1642.002328][T15855] __kasan_report+0x14b/0x1c0 [ 1642.007102][T15855] ? lockdep_hardirqs_on+0x2f1/0x7d0 [ 1642.012386][T15855] ? pipe_write+0x579/0x1130 [ 1642.016971][T15855] kasan_report+0x26/0x50 [ 1642.021312][T15855] __asan_report_store8_noabort+0x17/0x20 [ 1642.027289][T15855] pipe_write+0x579/0x1130 [ 1642.031873][T15855] __vfs_write+0x5a1/0x740 [ 1642.036373][T15855] vfs_write+0x275/0x590 [ 1642.040608][T15855] ksys_write+0x117/0x220 [ 1642.044920][T15855] __x64_sys_write+0x7b/0x90 [ 1642.049492][T15855] do_syscall_64+0xf7/0x1c0 [ 1642.053985][T15855] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1642.059855][T15855] RIP: 0033:0x45a679 [ 1642.063726][T15855] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1642.083574][T15855] RSP: 002b:00007f92dd4a0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1642.091961][T15855] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a679 [ 1642.100036][T15855] RDX: 00000000fffffef3 RSI: 00000000200001c0 RDI: 0000000000000004 [ 1642.108062][T15855] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1642.116291][T15855] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f92dd4a16d4 [ 1642.124258][T15855] R13: 00000000004c7830 R14: 00000000004e44b0 R15: 00000000ffffffff [ 1642.132240][T15855] [ 1642.134569][T15855] Allocated by task 15863: [ 1642.138990][T15855] __kasan_kmalloc+0x11c/0x1b0 [ 1642.143745][T15855] kasan_kmalloc+0x9/0x10 [ 1642.148140][T15855] __kmalloc+0x254/0x340 [ 1642.152535][T15855] kcalloc+0x36/0x60 [ 1642.156408][T15855] pipe_fcntl+0x413/0x810 [ 1642.160759][T15855] do_fcntl+0x56d/0x1180 [ 1642.165011][T15855] __se_sys_fcntl+0xde/0x1b0 [ 1642.169585][T15855] __x64_sys_fcntl+0x7b/0x90 [ 1642.174383][T15855] do_syscall_64+0xf7/0x1c0 [ 1642.178976][T15855] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1642.185019][T15855] [ 1642.187338][T15855] Freed by task 13280: [ 1642.191400][T15855] __kasan_slab_free+0x12a/0x1e0 [ 1642.196337][T15855] kasan_slab_free+0xe/0x10 [ 1642.200915][T15855] kfree+0x115/0x200 [ 1642.205481][T15855] put_files_struct+0x2c9/0x340 [ 1642.210484][T15855] exit_files+0x80/0xa0 [ 1642.214618][T15855] do_exit+0x572/0x2020 [ 1642.218751][T15855] do_group_exit+0x15c/0x2b0 [ 1642.223335][T15855] get_signal+0x4ac/0x1d60 [ 1642.227740][T15855] do_signal+0x37/0x640 [ 1642.231968][T15855] prepare_exit_to_usermode+0x32d/0x5b0 [ 1642.237609][T15855] syscall_return_slowpath+0x113/0x4a0 [ 1642.243187][T15855] do_syscall_64+0x11f/0x1c0 [ 1642.247759][T15855] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1642.253635][T15855] [ 1642.255958][T15855] The buggy address belongs to the object at ffff888095f48b80 [ 1642.255958][T15855] which belongs to the cache kmalloc-64(17:syz0) of size 64 [ 1642.271760][T15855] The buggy address is located 40 bytes inside of [ 1642.271760][T15855] 64-byte region [ffff888095f48b80, ffff888095f48bc0) [ 1642.284861][T15855] The buggy address belongs to the page: [ 1642.290491][T15855] page:ffffea000257d200 refcount:1 mapcount:0 mapping:ffff88809f99b380 index:0xffff888095f48100 [ 1642.300882][T15855] raw: 00fffe0000000200 ffff8880a2481638 ffffea0002190a88 ffff88809f99b380 [ 1642.309629][T15855] raw: ffff888095f48100 ffff888095f48000 0000000100000008 0000000000000000 [ 1642.318198][T15855] page dumped because: kasan: bad access detected [ 1642.324599][T15855] [ 1642.326928][T15855] Memory state around the buggy address: [ 1642.332623][T15855] ffff888095f48a80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1642.340728][T15855] ffff888095f48b00: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1642.348858][T15855] >ffff888095f48b80: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 1642.356985][T15855] ^ [ 1642.362340][T15855] ffff888095f48c00: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1642.370392][T15855] ffff888095f48c80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1642.378452][T15855] ================================================================== [ 1642.386510][T15855] Disabling lock debugging due to kernel taint [ 1642.398192][T15855] Kernel panic - not syncing: panic_on_warn set ... [ 1642.404824][T15855] CPU: 1 PID: 15855 Comm: syz-executor.0 Tainted: G B 5.4.0-syzkaller #0 [ 1642.414267][T15504] kobject: 'syz_tun' (00000000fd5716c0): kobject_cleanup, parent 000000000690296a 03:19:07 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000008c0)=[{0x0, 0x0, 0x78af}], 0x0, &(0x7f0000000580)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') creat(0x0, 0x0) io_destroy(0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x4e21, 0x4e21, 0x8}}}}}, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfe47) 03:19:07 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$alg(r1, &(0x7f00000000c0)=[{0x0, 0xff00, 0x0, 0x0, &(0x7f0000002780)=[@op={0x18, 0x29, 0x4}], 0x18}], 0x146, 0x0) 03:19:07 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r1 = socket$caif_stream(0x25, 0x1, 0x0) connect$caif(r1, &(0x7f00000000c0), 0x18) 03:19:07 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0815b5055e0bcfe87b3071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0xffffffffffffff21) recvmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002a00)=""/207, 0x20002acf}], 0x1}}], 0x1, 0x0, 0x0) 03:19:07 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b31afdc1338d544", 0x38}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="380000001e0009010c0000810000000007003401000000000800bec00049000018000a00"], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 1642.414616][T15855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1642.424187][T15504] kobject: 'syz_tun' (00000000fd5716c0): calling ktype release [ 1642.433824][T15855] Call Trace: [ 1642.433841][T15855] dump_stack+0x1fb/0x318 [ 1642.433852][T15855] panic+0x264/0x7a9 [ 1642.433862][T15855] ? trace_hardirqs_on+0x34/0x80 [ 1642.433877][T15855] __kasan_report+0x1bb/0x1c0 [ 1642.441870][T15504] kobject: 'syz_tun': free name [ 1642.444751][T15855] ? lockdep_hardirqs_on+0x2f1/0x7d0 [ 1642.444763][T15855] ? pipe_write+0x579/0x1130 [ 1642.444773][T15855] kasan_report+0x26/0x50 [ 1642.444782][T15855] __asan_report_store8_noabort+0x17/0x20 [ 1642.444792][T15855] pipe_write+0x579/0x1130 [ 1642.486680][T15864] caif:caif_disconnect_client(): nothing to disconnect [ 1642.487626][T15855] __vfs_write+0x5a1/0x740 [ 1642.487642][T15855] vfs_write+0x275/0x590 [ 1642.494606][T15867] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1642.499427][T15855] ksys_write+0x117/0x220 [ 1642.499437][T15855] __x64_sys_write+0x7b/0x90 [ 1642.499452][T15855] do_syscall_64+0xf7/0x1c0 [ 1642.530174][T15855] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1642.536975][T15855] RIP: 0033:0x45a679 [ 1642.540857][T15855] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1642.561517][T15855] RSP: 002b:00007f92dd4a0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1642.569921][T15855] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a679 [ 1642.577960][T15855] RDX: 00000000fffffef3 RSI: 00000000200001c0 RDI: 0000000000000004 [ 1642.585913][T15855] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1642.594009][T15855] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f92dd4a16d4 [ 1642.602133][T15855] R13: 00000000004c7830 R14: 00000000004e44b0 R15: 00000000ffffffff [ 1642.612573][T15855] Kernel Offset: disabled [ 1642.617179][T15855] Rebooting in 86400 seconds..