a40ff023122e66f6"}}]}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000006c0)=0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000700)={[], 0x38b, 0x0, 0x1, 0xa1c3, 0x7fffffff, r2}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000001fa6a0a00fffffff6006118000000002b8af20d"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x12, 0x5, &(0x7f0000000840)=ANY=[@ANYBLOB="1800000000000000000000000000000005000000000000000000000000000000000000000000000009e138e8cc393054c1cb86ef9654c68e21249dda5079f6a62de17405bfd0c078fb4814af01244bd17e02a53e20eb474d4b0b5a627393d66034150e2a0a90d9341ae1075e768bf01e7f78e82b4ab249aadf56c7946c8c58a67f9fffd9c6bfd1fa4a512bb3145f19ad447f0a8375d29c7969f6a7196ccc98b114f1afa37673c152ef3281563c516dba374b8b749c9bec85c8a23ddd31f337ac7d82643dce58da00000000fa0aab774f468eb7cce50300000043e8d806b1d01f0089237ba5651f1373bfd8269a9a1de11a0df986bdc89075aab48da31e9598ff5c61ac8c3d278e7fc5e0e9e1f8bbc42e3972f02a403ccf1d9b36f948471b3f2034a3d03a30466f3dc89915dcf2ff65d46e5843fb3b3c271272f08d409970917f8128e90fa4e71ee8daa0cdb60b609546b4a931089f0f7c00731012f32f8d05000000cfb987f06a865f67543e13b9c352a65cd595c512837a15648c8d74300c2d6ecbe2b56325d0e33bb4cbddf9945ff311969b338d52bd770d4dba3e508558933ba73e8d5903aa3a6f1948c79e5da1128c0d5a4870a5cdf64f5120a19edc5a494238a3d1f8ff452cdf69f3e0c7268f5e608bc94aee51de4eb6a51e0565c02300000000"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x4bb, &(0x7f0000000300)=""/187, 0x0, 0x0, [], 0x0, 0xb}, 0x48) 00:25:50 executing program 0: socket$packet(0x11, 0x6, 0x300) r0 = socket$netlink(0x10, 0x3, 0x1) write(r0, &(0x7f0000000140)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r1 = socket$packet(0x11, 0x3, 0x300) socketpair(0x5, 0x0, 0x64ba, &(0x7f00000000c0)={0xffffffffffffffff}) openat$cgroup_ro(r2, &(0x7f0000000100)='pids.current\x00', 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0x8, &(0x7f0000000000)=0xfffffffffffff801, 0x4) socket$packet(0x11, 0x2, 0x300) recvmsg(r0, &(0x7f0000000640)={&(0x7f0000000040)=@rc, 0x80, &(0x7f0000000580), 0x0, &(0x7f00000005c0)=""/124, 0x7c}, 0x0) 00:25:51 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xff0f, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:25:51 executing program 5: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000100)=[{}], 0x1, 0x3ff, &(0x7f0000000140), 0x8) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='dctcp-reno\x00', 0xb) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x1000000000016) 00:25:51 executing program 3: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x80) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f00000001c0)={&(0x7f0000000080)=[0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x9, 0x6, 0x2}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x40000005, 0x0) readv(r0, &(0x7f0000000200), 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/sequencer\x00', 0x6000, 0x0) 00:25:51 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x5400, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:25:51 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0x40000000]}, 0x10) 00:25:51 executing program 3: syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x2, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x40000005, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r0, 0x4010641a, &(0x7f0000000080)={0x9, &(0x7f0000000040)=[0x1, 0x1, 0x4, 0x400, 0x6, 0xcfe, 0x34954e0d, 0xffffffffffff0001, 0x4]}) openat$sequencer(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/sequencer\x00', 0x6000, 0x0) 00:25:51 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) flock(r1, 0x1) unlink(&(0x7f0000000380)='./file0\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000100)={0x20, 0x7ff, 0x20d, 0x0, 0x8, 0x24, 0x7ff, 0x40, 0x0}, &(0x7f0000000140)=0x20) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000001c0)) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000180)={0x1ff, 0x201, 0x100000000, 0x0, r2}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) 00:25:51 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x4, 0x40000) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) timerfd_settime(r0, 0x1, &(0x7f0000000100)={{0x77359400}, {r2, r3+10000000}}, &(0x7f0000000140)) ioctl$FIBMAP(r1, 0x1, &(0x7f00000003c0)=0x9) r4 = semget$private(0x0, 0x1, 0x80) semctl$GETALL(r4, 0x0, 0xd, &(0x7f00000001c0)=""/124) 00:25:51 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x4000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:25:51 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xfec0, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1280.374348] device bridge_slave_1 left promiscuous mode [ 1280.379837] bridge0: port 2(bridge_slave_1) entered disabled state 00:25:51 executing program 3: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x2, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x40000005, 0x0) readv(r0, &(0x7f00000008c0)=[{&(0x7f0000000300)=""/151, 0x97}], 0x1) openat$sequencer(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/sequencer\x00', 0x6000, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x7c4}) [ 1280.439514] device bridge_slave_0 left promiscuous mode [ 1280.469604] bridge0: port 1(bridge_slave_0) entered disabled state 00:25:51 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x7, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1280.611649] team0 (unregistering): Port device team_slave_1 removed [ 1280.640928] IPVS: ftp: loaded support on port[0] = 21 00:25:51 executing program 3: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x2, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x40000005, 0x0) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000300)=""/151, 0x97}], 0x1000000000000257) openat$sequencer(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/sequencer\x00', 0x6000, 0x0) [ 1280.657387] team0 (unregistering): Port device team_slave_0 removed 00:25:51 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x3, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:25:51 executing program 3: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x2, 0x0) ioctl(r0, 0x9, &(0x7f0000000040)="b075b133b4d4b78ab6ad1543734a2f8b26e505d229619c98fda20155e9c8ffa396f1ee998167e613e2d8866895a3a5e312fa2ff99a017949aba05cdce84e35c8781099e59f4f03727afefaeda9039b84067366cfbd5b43b367eb82cacc88563a7b5a19f8fa750b070a0c7b07b879ee5f0f4a4945c91db8fc1cee296e49ddcf2522e95ea9e9d759afd01d4cabb3b6f023ff60d11b951a5810dabfaca20cc267227344b77a49ec7f9677e74aa9fdf3692a953c9b13afcb76aed78035b54a1f1927") r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x40000005, 0x0) readv(r0, &(0x7f00000008c0)=[{&(0x7f0000000300)=""/151, 0x97}], 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f00000001c0)={0x9, 0x100000000, 0x7fffffff, 'queue0\x00'}) openat$sequencer(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/sequencer\x00', 0x6000, 0x0) flistxattr(r1, &(0x7f00000003c0)=""/247, 0xf7) [ 1280.698144] bond0 (unregistering): Releasing backup interface bond_slave_1 00:25:51 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x801000cf00000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1280.738419] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1280.820731] bond0 (unregistering): Released all slaves [ 1280.848398] net_ratelimit: 9 callbacks suppressed [ 1280.848438] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:25:52 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0x74000000]}, 0x10) 00:25:52 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xf5ffffff00000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:25:52 executing program 3: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x2, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x40000005, 0x0) readv(r0, &(0x7f00000008c0)=[{&(0x7f0000000300)=""/151, 0x97}], 0x3bb) openat$sequencer(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/sequencer\x00', 0x6000, 0x0) [ 1281.432146] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1281.448638] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1281.565955] bridge0: port 1(bridge_slave_0) entered blocking state [ 1281.572448] bridge0: port 1(bridge_slave_0) entered disabled state [ 1281.580174] device bridge_slave_0 entered promiscuous mode [ 1281.604870] bridge0: port 2(bridge_slave_1) entered blocking state [ 1281.611260] bridge0: port 2(bridge_slave_1) entered disabled state [ 1281.618375] device bridge_slave_1 entered promiscuous mode [ 1281.648491] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1281.677780] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1281.746173] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1281.771659] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1281.873491] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1281.881515] team0: Port device team_slave_0 added [ 1281.905670] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1281.912740] team0: Port device team_slave_1 added [ 1281.935970] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1281.960434] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1281.985372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1282.010828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1282.230522] bridge0: port 2(bridge_slave_1) entered blocking state [ 1282.236914] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1282.243469] bridge0: port 1(bridge_slave_0) entered blocking state [ 1282.249862] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1282.257669] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1282.976638] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1283.047193] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1283.083954] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1283.125616] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1283.131729] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1283.143364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1283.207069] 8021q: adding VLAN 0 to HW filter on device team0 00:25:54 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f00000000c0)={'IDLETIMER\x00'}, &(0x7f0000000100)=0x1e) write$P9_RREAD(r0, &(0x7f0000000040)={0x2c, 0x75, 0x2, {0x21, "7b954002386175d4d0067d53d2522be166403fea206f4c3c0867fbe19a3baf3010"}}, 0x2c) timerfd_create(0x7051c0577d0c8bb7, 0x80000) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="7407000000430000e034258367bb790820f8ac35cf652bb0f39eb65349987404e91143ca4977133308335053e5f440df6e365d2b1f4f39"]) 00:25:54 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x800000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000)=0x1ff, 0x4) listen(r1, 0xffffffff) read(r1, &(0x7f0000000140)=""/113, 0x352) r2 = socket$nl_generic(0xa, 0x5, 0x84) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001480)) socket$inet(0x2, 0x0, 0x3f) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000300), &(0x7f0000000340)=0x4) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="040325bd7000fbdbdf250c0000002000ffffffff030059782a000000008000000000000000fe37c55027ffffff05000008000100f2aff2fff1a5ffffffffffff06becf8f1fd5215d909168d028677e2809008d0717000b0002001fb5c75af3fca2f87bbbdd201087753fd3a18054425bbab9b25b03c4f3b3a76f02fb1c52d37f9c44c1f049"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r3 = socket$inet_sctp(0x2, 0x1, 0x84) r4 = socket$inet6(0xa, 0x0, 0x1) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) connect$netlink(r2, &(0x7f0000000200)=@kern={0x10, 0x0, 0x0, 0x1000000}, 0xc) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x6, 0xfffffffffffffffb, 0x0, 0x401, 0x0, 0x3e, 0xe8, 0x0, 0x38, 0x7b, 0xff, 0x0, 0x20, 0x0, 0x200, 0x0, 0x80000001}, [{0x6, 0x5, 0x9, 0x9, 0x100000001, 0x80, 0x8, 0x200}]}, 0x58) ioctl$sock_SIOCETHTOOL(r3, 0x89f1, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="4d0000000500000009080021050401020500000003000000090000"]}) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0xb, 0x3ff}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) close(0xffffffffffffffff) sendto$inet6(r5, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x40004e23, 0x0, @loopback}, 0x1c) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fstat(r6, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r7}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r8}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}]}}) read$FUSE(r7, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000940)='./file0/file0\x00', &(0x7f0000000880)) read$FUSE(r7, &(0x7f0000002000), 0x1000) 00:25:54 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xea03000000000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:25:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, @perf_bp={&(0x7f0000000440)}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x2000, 0x0) getrusage(0x0, &(0x7f0000000100)) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0xffffff7f00000000}, 0xc, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}}, 0x0) 00:25:54 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x300000000000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:25:54 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0xfc000000]}, 0x10) 00:25:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0xbb7f, 0x4b51010000000000}, 0xef, &(0x7f0000000140)={&(0x7f0000000b80)=ANY=[@ANYBLOB="1c000000010000000000000000000000000000000000006e00000300"], 0x1}}, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) r1 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000002c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3700000041f1adfb3ed5e16d6c0c2b5ca5e0f3255ace831ed66800e97d08a1231d82bbbbeaa60f38268eb5cb3d5135a7008c36da37e272904422c99c4ae4bdeff951922d3840543317ad0b877a8c97b63c8ceb3b33128676485d298aee58401e18dbbf13056fb113fa1a2fd03efd8637860d58d6f0ba759587c3c41908c08c7f56e4e5a898568dbbc42f644d3fbaa88643c66829d94100e63a0240787a0130b4b493431c4eeeb69552ca32e6eece5d2a22970d6da5108d7b0629ae5602d4822414df9f6d69abd47e225be2d8a2974310b0ef13e3a89dc079ae4c489e24187e963445f26f5d5e7bae13238f2d6f00000000000000000000"], &(0x7f0000000200)=0x3f) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000240)={r2, 0xfffffffffffffff7}, 0x8) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x800, 0x0) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f00000000c0)="9a48bac5baef2dad9881ab3c8d1f2e09600bbd487b4a3472667a2f4ca9573b6843bd42aa7a31bc079e020bb627d6876ff5b3d195653665652ee5e81ea4f0bf4b0704e8f3597a95a8071c586c6e49574edf1a1c6435ac4f29f5a91a8484f3ae60a97f9f9d3508") syz_open_pts(r3, 0x220000) syz_open_pts(r3, 0x10000) [ 1283.678274] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1283.685653] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1283.706218] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:25:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000140)=@xdp, 0x80, &(0x7f0000001340), 0x0, &(0x7f00000013c0)=""/141, 0x8d}}], 0x1, 0x0, &(0x7f00000015c0)) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x0) socket$inet6(0xa, 0x0, 0x0) 00:25:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, @perf_bp={&(0x7f0000000440)}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x2000, 0x0) getrusage(0x0, &(0x7f0000000100)) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0xffffff7f00000000}, 0xc, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}}, 0x0) 00:25:55 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x7, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:25:55 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xea03000000000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1284.026161] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:25:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, @perf_bp={&(0x7f0000000440)}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x2000, 0x0) getrusage(0x0, &(0x7f0000000100)) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0xffffff7f00000000}, 0xc, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}}, 0x0) [ 1284.244294] IPVS: ftp: loaded support on port[0] = 21 00:25:55 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x44dcd249, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1284.383517] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1284.514721] device bridge_slave_1 left promiscuous mode [ 1284.520336] bridge0: port 2(bridge_slave_1) entered disabled state 00:25:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3000, 0xfffffffffffffffe, &(0x7f0000ffd000/0x3000)=nil) 00:25:55 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0xf00]}, 0x10) 00:25:55 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x1802000000000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1284.614686] device bridge_slave_0 left promiscuous mode [ 1284.620325] bridge0: port 1(bridge_slave_0) entered disabled state 00:25:55 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xa00, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1284.657442] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1284.666477] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:25:55 executing program 5: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'lo\x00'}) [ 1284.733155] team0 (unregistering): Port device team_slave_1 removed [ 1284.747314] team0 (unregistering): Port device team_slave_0 removed [ 1284.757575] bond0 (unregistering): Releasing backup interface bond_slave_1 00:25:55 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x89f3, &(0x7f0000000280)={'eql\x00\x00\x00\x00\x005\x00', @ifru_data=&(0x7f00000002c0)="b997af85057008d97df27dd80696d72add12974e7e4fb2edcc43ae4c312f7b4b"}) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000000)=0xfffffffffffffe01, 0x2) 00:25:56 executing program 5: syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x1000, 0x200800) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x100000001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000500)={r0, &(0x7f0000000000), &(0x7f0000000440)=""/129}, 0x18) [ 1284.800078] bond0 (unregistering): Releasing backup interface bond_slave_0 00:25:56 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xb7100a00, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:25:56 executing program 5: futex(&(0x7f000000cffc), 0x1, 0x0, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000000140), 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, @random}]}) futex(&(0x7f000000cffc), 0x4, 0x1, &(0x7f0000cc3ff0), &(0x7f000044b000), 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80000, 0x0) [ 1284.875288] bond0 (unregistering): Released all slaves 00:25:56 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xea03000000000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1285.484224] bridge0: port 1(bridge_slave_0) entered blocking state [ 1285.491593] bridge0: port 1(bridge_slave_0) entered disabled state [ 1285.499420] device bridge_slave_0 entered promiscuous mode [ 1285.539348] bridge0: port 2(bridge_slave_1) entered blocking state [ 1285.545885] bridge0: port 2(bridge_slave_1) entered disabled state [ 1285.553240] device bridge_slave_1 entered promiscuous mode [ 1285.579287] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1285.605004] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1285.695082] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1285.722401] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1285.863201] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1285.870379] team0: Port device team_slave_0 added [ 1285.892845] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1285.899953] team0: Port device team_slave_1 added [ 1285.922509] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1285.947653] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1285.972087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1285.996066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1286.198931] bridge0: port 2(bridge_slave_1) entered blocking state [ 1286.205309] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1286.211865] bridge0: port 1(bridge_slave_0) entered blocking state [ 1286.218280] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1286.225652] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1286.940724] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1287.013663] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1287.083387] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1287.089937] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1287.101588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1287.144207] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1287.170685] 8021q: adding VLAN 0 to HW filter on device team0 00:25:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, @perf_bp={&(0x7f0000000440)}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x2000, 0x0) getrusage(0x0, &(0x7f0000000100)) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0xffffff7f00000000}, 0xc, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}}, 0x0) 00:25:58 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x983a, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:25:58 executing program 5: futex(&(0x7f000000cffc), 0x1, 0x0, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000000140), 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, @random}]}) futex(&(0x7f000000cffc), 0x4, 0x1, &(0x7f0000cc3ff0), &(0x7f000044b000), 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80000, 0x0) 00:25:58 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x7000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:25:58 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0xfffc]}, 0x10) 00:25:58 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xea03000000000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:25:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, @perf_bp={&(0x7f0000000440)}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x2000, 0x0) getrusage(0x0, &(0x7f0000000100)) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0xffffff7f00000000}, 0xc, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}}, 0x0) [ 1287.608632] net_ratelimit: 2 callbacks suppressed [ 1287.608650] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1287.628832] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1287.641672] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:25:58 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xa00, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:25:58 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xf38a, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:25:59 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x5000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:25:59 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x999434888d, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1287.858914] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:25:59 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0xd8180, 0x0) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f0000000140)) sendmsg$nl_generic(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x28, 0xb01, 0x0, 0x0, {0x7}}, 0x14}}, 0x0) 00:25:59 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x8af3, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1288.011190] IPVS: ftp: loaded support on port[0] = 21 00:25:59 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x10, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:25:59 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x4d145127, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:25:59 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x2724, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1288.276115] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1288.287082] device bridge_slave_1 left promiscuous mode [ 1288.292782] bridge0: port 2(bridge_slave_1) entered disabled state [ 1288.324681] device bridge_slave_0 left promiscuous mode [ 1288.330166] bridge0: port 1(bridge_slave_0) entered disabled state 00:25:59 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0xfeffffff00000000]}, 0x10) 00:25:59 executing program 3: r0 = socket$inet6(0x10, 0x80002, 0x0) sendmsg(r0, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000002000)=[{&(0x7f0000001000)="5500000018007fafb72d1cb2a4a280930206020000a843096c2623692500080000c90200f0ff66039848a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83c43a11000000bf0cec6bab91d4000000000000", 0x55}], 0x1, &(0x7f0000002040)}, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x3, 0x30, 0x7, 0x1}, &(0x7f00000000c0)=0x18) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000100)={r1, 0x1f, 0x74, "a485211249753fe1b18b6a534decc739251417657b05643a87dd0985e5ad0bfa1804c704fbc7df2386ca4f0ed954e46c0bdda2ccb3d8b64c87755d7f4afaf0a8ef1f25abe7b1604b4ccff226287f352042e1a26f770362752b66d90933e9a0810f9e309ac4486470fff9891f161bd61c6399d757"}, 0x7c) 00:25:59 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xfec00000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1288.380663] team0 (unregistering): Port device team_slave_1 removed [ 1288.389557] team0 (unregistering): Port device team_slave_0 removed [ 1288.400336] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1288.454837] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1288.475285] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1288.480972] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:25:59 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xa00, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:25:59 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x12e660, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1288.538607] bond0 (unregistering): Released all slaves 00:25:59 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f00000000c0)="baf80c66b877324a8266efbafc0cb0e5ee640f181066b887db3e910f23d80f21f86635c00000a00f23f80f21fa66b9f40800000f32c16600993e3e2e650f01cb0fc72ef6ff0f350f30", 0x49}], 0x1, 0x50, &(0x7f0000000180), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:25:59 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xf5ffffff, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1288.599127] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1289.556781] bridge0: port 1(bridge_slave_0) entered blocking state [ 1289.563210] bridge0: port 1(bridge_slave_0) entered disabled state [ 1289.570749] device bridge_slave_0 entered promiscuous mode [ 1289.618301] bridge0: port 2(bridge_slave_1) entered blocking state [ 1289.624738] bridge0: port 2(bridge_slave_1) entered disabled state [ 1289.631582] device bridge_slave_1 entered promiscuous mode [ 1289.654982] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1289.689680] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1289.754618] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1289.791954] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1289.888720] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1289.895910] team0: Port device team_slave_0 added [ 1289.917507] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1289.924639] team0: Port device team_slave_1 added [ 1289.946376] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1289.970250] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1289.993692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1290.018827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1290.220980] bridge0: port 2(bridge_slave_1) entered blocking state [ 1290.227357] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1290.234007] bridge0: port 1(bridge_slave_0) entered blocking state [ 1290.240343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1290.248192] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1290.960068] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1291.030150] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1291.099128] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1291.105296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1291.112206] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1291.184015] 8021q: adding VLAN 0 to HW filter on device team0 [ 1291.194044] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 00:26:02 executing program 0: r0 = socket(0x1e, 0x1000000000005, 0x0) getsockname$inet(r0, &(0x7f00000013c0)={0x2, 0x0, @local}, &(0x7f0000001400)=0x10) listen(r0, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast2, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) accept4$bt_l2cap(r0, &(0x7f0000001340), &(0x7f0000001380)=0xe, 0x80800) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@local, @mcast1, @dev={0xfe, 0x80, [], 0xa}, 0x7, 0x7fffffff, 0x6, 0x400, 0x7fff, 0x120020, r1}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x10040, 0x0) lsetxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='security.capability\x00', &(0x7f0000001300)=@v1={0x1000000, [{0x1, 0x6}]}, 0xc, 0x82e73e2417c05074) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f00000002c0)=""/4096) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) 00:26:02 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x2000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:02 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x103080, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:02 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xa00, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:02 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0x400300]}, 0x10) 00:26:02 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) r2 = epoll_create(0xe29f) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000240)) ppoll(&(0x7f0000000140)=[{r2}, {r0}], 0x2, &(0x7f0000000180)={0x77359400}, &(0x7f0000000040), 0x8) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f00000000c0)={0x1, 0x280}, 0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00000005c0)) 00:26:02 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000480)='/dev/input/mouse#\x00', 0x9, 0x241) mkdirat$cgroup(r1, &(0x7f00000004c0)='syz1\x00', 0x1ff) r2 = syz_open_dev$admmidi(&(0x7f0000000340)='/dev/admmidi#\x00', 0x8000, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r2, 0x4008ae73, &(0x7f0000000140)={0x8000000, 0x4}) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0xfc) unshare(0x40000000) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000000c0)={0x1, 0xcddb}, 0x8) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000540)={'ip6_vti0\x00', {0x2, 0x4e23, @remote}}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e21, 0x4, @dev={0xfe, 0x80, [], 0x16}, 0x1f}}, 0x3ff, 0x2, 0x7, 0x10001, 0xfffffffffffff702}, &(0x7f0000000100)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000440)=@assoc_value={r3}, 0x8) fremovexattr(r0, &(0x7f0000000040)=@known='system.posix_acl_access\x00') setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000007c0)={0x7, 0x9, 0x2, 0x4, 0x3f, 0x5, 0x7, 0x0, 0x8000, 0x8000, 0x2}, 0xb) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000080)='port0\x00') setsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000500)=0x3, 0x2) accept(r2, &(0x7f0000000640)=@un=@abs, &(0x7f00000006c0)=0x80) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000180)={{0x9}, 'port1\x00', 0x4, 0x4c, 0x6, 0x4, 0x0, 0x1, 0x9, 0x0, 0x0, 0x80}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000240)={0x0, 0xa7f2, 0x9ff, 0x9}, &(0x7f0000000280)=0x10) r5 = shmget$private(0x0, 0x4000, 0x201, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_INFO(r5, 0xe, &(0x7f0000000700)=""/154) ioctl(r0, 0x13454a73, &(0x7f0000000580)="309af8ad6af313fa4cfaf1885cb26eb71fcb3fc42d2fad2a7e66bb6351430d9d5fe3a5dfd92f79bb1caa3eb259f9157ac441295d77866128cb74d20655a011818dc98aaa4bc4e8a9b437a8b202c3710f98977123f11e8edb0e3f00ba49bebdacd9cbb7091ae0d1f9ccaa0e76cdfbcd9f4d685bb5d9790b9fc628be828b37e89048998a0f4c4a19025b79dae1bca946d993fd74be4d6647a39a736f91805d4dab4825b8fa7084c91638c70b3bf9") getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000002c0)={0x8, 0x8001, 0x3f800000000000, 0x4, r4}, &(0x7f0000000300)=0x10) [ 1291.652892] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1291.670301] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:26:03 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x218, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:03 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xe00000000000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) fstat(r0, &(0x7f0000001780)) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000001a80)=ANY=[], 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000001640)=[{0x0, 0x2}, {0xe, 0xffffffffffffff8f}, {0x4}], 0x3) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000001200)=0x4fae) r2 = accept$alg(r0, 0x0, 0x0) getxattr(&(0x7f00000013c0)='./file0\x00', &(0x7f0000001240)=@random={'osx.', '/proc/thread-self/attr/exec\x00'}, &(0x7f0000001480)=""/85, 0xfffffffffffffe23) r3 = socket$pppoe(0x18, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f00000000c0)=@ethtool_ringparam={0x7, 0x0, 0x70e000, 0x0, 0x2}}) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000001580)=ANY=[@ANYBLOB="03000000000000003e0b00000000000000000000000000003f0b000000000000d8bf000000000000000000000000000001674a99beffffff"]) clock_gettime(0x7, &(0x7f0000001280)) sendmmsg$alg(r2, &(0x7f0000005900)=[{0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000000)={&(0x7f00000000c0)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1, &(0x7f0000fb3fa9)=""/87, 0x251}, 0x0) 00:26:03 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x8000a0ffffffff, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1292.016407] IPVS: ftp: loaded support on port[0] = 21 00:26:03 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x7562a2400000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:03 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x8030100000000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:03 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x400000000000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:03 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x91ffffff, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1292.304528] device bridge_slave_1 left promiscuous mode [ 1292.310099] bridge0: port 2(bridge_slave_1) entered disabled state [ 1292.395024] device bridge_slave_0 left promiscuous mode [ 1292.400794] bridge0: port 1(bridge_slave_0) entered disabled state 00:26:03 executing program 5: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140)=0x78, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(&(0x7f0000000300)='/dev/snd/midiC#D#\x00', 0x7, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000100), 0x921b527a62bfd8af) ioctl$KVM_GET_REGS(0xffffffffffffffff, 0x8090ae81, &(0x7f0000000940)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000600), 0xffffffffffffffff) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xe, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) nanosleep(&(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x2, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xed59, 0x100000001, 0x9, 0x0, 0x8, 0xfff, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0xb54, 0x0, 0x7f, 0x0, 0xfff, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x1038, 0x0, 0x0, 0x7, 0x3, 0x4, 0x85c}, 0x0, 0x3, 0xffffffffffffffff, 0x3) accept$alg(0xffffffffffffffff, 0x0, 0x0) gettid() socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000500)='/dev/hwrng\x00', 0x81f5cabe215d8e43, 0x0) r2 = geteuid() fstat(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='overlay\x00', 0x90000, &(0x7f0000000480)=ANY=[@ANYBLOB='obj_user=GPL\x00,fowner>', @ANYRESDEC=r2, @ANYBLOB="c1166bfed32c726f6f74ffffffffffffc018726f6f74", @ANYRESDEC=r3, @ANYBLOB=',dont_measure,obj_user=/dev/hwrng\x00,\x00']) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000240)={0x8, 0x5, 0x8, 0x0, 0x2, 0xffffffffffffe4ad, 0x7f4, 0x7, 0x0}, &(0x7f0000000280)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000002c0)={r4, 0x95d, 0x30}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000000200), 0x0, 0x20000004, &(0x7f0000000540)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 00:26:03 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0x600]}, 0x10) 00:26:03 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x40000000000000) r1 = dup3(r0, r0, 0x80000) write$P9_RWSTAT(r1, &(0x7f0000000040)={0x7, 0x7f, 0x2}, 0x7) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000140)=""/213, 0xd5, 0x10000, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000b94000)=""/246) close(r2) getuid() sched_getattr(0x0, &(0x7f0000000100), 0x30, 0x0) fstat(0xffffffffffffffff, &(0x7f0000004280)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000180)) ioctl$TCSETAW(r3, 0x5407, &(0x7f0000000000)) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') write$P9_RXATTRCREATE(r4, &(0x7f0000000140)={0x7}, 0x7) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000156, 0x0) 00:26:03 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x8000a0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:03 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x20000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1292.538182] team0 (unregistering): Port device team_slave_1 removed 00:26:03 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004080)=[{&(0x7f0000002b80)=@abs, 0x6e, &(0x7f0000002e00)}], 0x1, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)={'3! ', './file0', [{0x20, '+(\'/eth1'}, {0x20, '3! '}, {0x20, '3! '}, {0x20, '3! '}, {0x20, '3! '}, {0x20, 'vboxnet0^'}]}, 0x2e) [ 1292.581807] team0 (unregistering): Port device team_slave_0 removed [ 1292.606662] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1292.648325] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1292.731015] bond0 (unregistering): Released all slaves [ 1293.103057] bridge0: port 1(bridge_slave_0) entered blocking state [ 1293.109543] bridge0: port 1(bridge_slave_0) entered disabled state [ 1293.117132] device bridge_slave_0 entered promiscuous mode [ 1293.153695] bridge0: port 2(bridge_slave_1) entered blocking state [ 1293.160157] bridge0: port 2(bridge_slave_1) entered disabled state [ 1293.167997] device bridge_slave_1 entered promiscuous mode [ 1293.204048] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1293.240024] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1293.356553] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1293.397732] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1293.515975] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1293.523178] team0: Port device team_slave_0 added [ 1293.545173] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1293.552206] team0: Port device team_slave_1 added [ 1293.575649] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1293.613436] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1293.638702] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1293.645754] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1293.653560] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1293.677551] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1293.684614] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1293.692423] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1293.895321] bridge0: port 2(bridge_slave_1) entered blocking state [ 1293.901692] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1293.908373] bridge0: port 1(bridge_slave_0) entered blocking state [ 1293.914754] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1293.922665] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1294.254022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1294.652871] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1294.722898] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1294.791928] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1294.798079] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1294.805688] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1294.874945] 8021q: adding VLAN 0 to HW filter on device team0 00:26:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000013c0)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f00000014c0)=0xe8) r0 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0), &(0x7f0000000340)="46ac5128da090e4899c38028efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c16c5c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67f6c3d7605eab3b675b6c061e6ef32b7ea8847b6f84da1334d35322b94447bfaca74b152eb64cfa54cb63126c2cc662e7898e6459ed40c4566403f303d341c9c34c6049d9f8e1c2a9483f003c20e66886d0e1629f498668c202f183de294d03da07c9f5feb65bc196554a79a2f255828c1f1cf9a09654f9df849443e8d290debcc78efbdca391a348b33f18ef618011273faa1f095298dd71db08a90e177a1e9a0c771deca3b51670a26850b89d4439574328c19d9e91766dd52169e0ad5011e4acc005861b3b3146d67445e6f6c75ce4af9d8db6963887d79113613267c5bc42fb0aca828590fb291ce8836d3cd391d364efdbb7015d8ec643d83b623380c21c6ebbf774498c94e60838a45d4692bfe73aaea2bbcecb6dcec20e5aa48a950428e2372009212f2f6be608cdec5ff84108f3f3d2e42c99a6d4cd4577ec9f39a51533efe71d494ccadb66eddd4cc0e56b33eefb0ada68ae36c905a977d9042a63299d2130f4e85357b0078c31bc45b00f5ccd879a6735d85882bfddbc6f2cff4a2b976b29e5a8adc74893c748b297a660ba0f64ad8a6ac6fcf180b6a4357ad6733cb75035cd58631142bd720cf52bcd1438647cbe1058e32d33c38f1327bef3f6b1c815ab4f2d47366473ae37c65a2d1df88823dd4c326d640c50e5bddfa976f04cd034331b632cd7a8bbc838081f28f6e24ed646721cea36e56501f9085e428a6c94b7ba5431f59651f36c8f715e4547ffed53c03cc58d2d4382193625cf69c197c4eb3c3c86c291d693837ab7eb23d61d2518379f0c61acf67425afa1ff8d1fac196a7ef9f6f9b514a2028ae010d1bf10833940294c400401ec706ce366dc4c62f6c55c6985a31592360cc7e6cc30a90cae1891b4cffb882b0329457503055db6a8e3b651b3302c24e6d149e8368ee6d3bafbc417256d042b4b87cb1bf46169ad1a593da66b2c6f453180f2c51be35c431e1af07e54c1251334415135422fa81b015a7a746c1979827e3d32057d408016cdc2b641a42626bbf8b7970a5638e9e48783ff80ded5b5184b69d41e60ba9e2ff7ef3e85b4419db2b064d64f833dc2035a6cc3ea28335ad94eb5ba974d9799ce94565559e6a7636b725c4c3dc1702af3c0f3d9dc77f6d404b7c8ff2cec2b4e703451a1d2750d9a22e9f4b5e27da765d228f09bbd30088ac9dff793ec759161849cf4217f5684bff8eddd65be61d3ed2dcc7bae8ab5e1260c3a90cdb37626c4871098802b34f271d8a091b0517bd1588b43cf21b2e3fe676e34d115a56d450d50a97ac7e2ea5904f9695dbde822dba41ac3a1190d63ef486a1829d38b005f9458a82533a555a2f674eea95af7ef7f0cf9654e0ed8d2ab722ca065fd97e6518b76a39cc1b04dc49c395f3aad5e05c76c1881f6a85fee6c6fba8340692eb0b7f3f948350e6947dac635cfef9e4ff4d3f756802cbd97e8c5845b25bc5a021d9875277f197d1bce55661e6961dd788a444962e33fa582a01d0bd61aaa22a76adf68b3169d3f0b49db0325e975a7a8a3", 0x4c9, 0xfffffffffffffffd) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000000)) keyctl$read(0xb, r0, &(0x7f0000005340)=""/4096, 0x1000) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000100)=@req={0x1, 0x4, 0x100}, 0x10) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000040)=0x1) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}}}, 0x20) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x20000, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000000840)={0xa8, "13b8eee28f9cdd900bfc450d09620c5eca12bc47142af6a0e84f10e417d70e57d6c0df71b6cda4a5d1088265fe22b92496d1f124340bc8fa19bb7b4c4da408397b9ac20e5c775dc2b34eb0181283e98cd109c91cdcad67b62028a2658dbb6f6e2977dc9564678f3fb32b5935c0ec1c07c26c9c090f04f5b157fe6d5451d83bcc57eb6e9c65b9510a4aa9ca637dc6e322939d74f06558d471c08d2a591a8b59af1247ae5b80e66f26"}) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x12, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) getgroups(0x0, &(0x7f0000001a80)) 00:26:06 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x8e000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:06 executing program 5: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 00:26:06 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x5000000000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:06 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x40000000000000) r1 = dup3(r0, r0, 0x80000) write$P9_RWSTAT(r1, &(0x7f0000000040)={0x7, 0x7f, 0x2}, 0x7) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000140)=""/213, 0xd5, 0x10000, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000b94000)=""/246) close(r2) getuid() sched_getattr(0x0, &(0x7f0000000100), 0x30, 0x0) fstat(0xffffffffffffffff, &(0x7f0000004280)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000180)) ioctl$TCSETAW(r3, 0x5407, &(0x7f0000000000)) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') write$P9_RXATTRCREATE(r4, &(0x7f0000000140)={0x7}, 0x7) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000156, 0x0) 00:26:06 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0x48]}, 0x10) [ 1295.327964] net_ratelimit: 8 callbacks suppressed [ 1295.327981] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1295.342390] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1295.347919] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:26:06 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) connect(r0, &(0x7f0000000080)=@nfc={0x27, 0x0, 0x2, 0x7}, 0x80) sendmmsg(r0, &(0x7f0000004500)=[{{&(0x7f0000000240)=@ipx={0x4, 0x101, 0x0, "c9ab16707815", 0x9}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000380)="f0cdedfaaa92eeb30bd130f11cb71d54195e6b1fca8c629cdda49589bbcddfbc6af1a601ab75277c20362b983e1b9dcacc0605d1d6cf6c9f592ac4e8d0da01e436ad6c846df10e2dbd5bde0ac2804d54547d5b1c9b1194a4cbc89667a764b3557b7eb7a251f1bf280cfe7f5a278300419b4a792958afdcd92213e956d2a73534b2d61f88cab145ca417340296a7cfb2bbe4138c69575637d47efa17fe29fa53a246848039a78b00c2598c67ad1f92ccbdbc35794e51b2238861482", 0xbb}, {&(0x7f0000000440)="0ecc9bd658e7f35451e0258b0194d1ac5452b5948ec8f227a2acb1353830ed7318b73aa430a1c8972a1c7041f71a936f1573ae85b9e654fb00b52b37599bda8e24bb9489a91937f665a6b704fb09541fa514ab74f35bffac581f471e748dc924a8b9969ef36541f2d77f6e90622cdfbf54378ba06f572c725ca3c0c7c7d935946f1532d5d91e027774176bac2f1f294d1876d91cdd3a32f79f68d74e50cab34493551f61c65ab5ad44ec746cdaaf10bb1ca2370b1a94325cee053516618cb8f196bc88af7570c941ffecbd39eaf7aea86715a569a3c42e9bb9c72f4096f94e004eed4ff34c01c1ae31dfc99594a9b95d39674881", 0xf4}, {&(0x7f0000000540)="4ec66124371cb006a203f5e8b770be4b0643c59e13d0f19e2f6beb61ff3de826a67faa15e6781e9b9419f05cc599837949260f01020d74fd445f86549f5e81ac1241f480ee08da3c260c896314de8d5815882b0f45c2b24becd6d317156f1940a33e16c765b65519b5bf30a20ab9e08e8562577f9c182c8f6d79f2042933368ffd12cf0633571b0f30b563eb0c44a6272278084c331d820639a527dfddec4a9718bef89a6678ef9513080844c71787cc21aaab39083f6c81d199adb48a8190e7174a229009f5", 0xc6}], 0x3, &(0x7f0000000640)=[{0x50, 0x11e, 0x2, "61af9fa855bb63c28e804b3f35e058168222bbd2b08d9dc212ed10b63cc877230d4a59799b55a26aaa10e8125553fca760fd3b0e6db2b5e6ff2331"}], 0x50, 0x10}, 0x3}, {{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000100)="62e1c96e27df65d8876aa299d4641ec1818708996c70c11e5510e29a97bfd832948b2ef9ddc76effa282f013a27e83ee9ca3f9f95c1f668c4668d9d468f2e8", 0x3f}, {&(0x7f00000006c0)="c4a87b4e0f409275c9a759b971a970fd626d928364a2c8fa87016d0875c531d2ac073032138cb8cd069fa725b39734cbfcceb9198211fe4dea8a25a463e8a4f399a128d8a43fa6cef7112af43ab088f72441fcbe75fd9670cd0f3b28b37c372216332440f2c9ad960991298a2f4ba8efc282be96b8b3f236d556d12703270334383867fe9ad6033be433176bed389cac83c3b34c4c0446a24c08ea2667ba9f4c200855a5a0c573d7", 0xa8}, {&(0x7f00000002c0)="f175043005c5965741c768820f", 0xd}], 0x3, &(0x7f00000007c0)=[{0xa0, 0x109, 0x7, "aceac0304934cac36c4eb4d2aa0a6d149d9fc27f184a00e909876545b5a452339f01b54f5ee3e8840ecb7f954ddd2bbc9103934c3b4e4d0ac605ce436a47c0bd439da9f66f7bd75edaa0bd79f4caec40ec22108313f912441b71e7582309ed3c994a1ae6961b1b5e643a5eb54cf62e4033169a2cca4afe2e7953f5b5770e0fad997019d98a1096ae0777c6"}], 0xa0, 0x24000000}, 0x7}, {{0x0, 0x0, &(0x7f0000002dc0)=[{&(0x7f0000000880)="1fa238c77f1286dbb3eb8a83cf6bcbbd3618b09b967bc08ee2da25760a1c8f597ede7ec0948d9dec0a0e45060b3413106caa5c5ab16f4acdf386411dd93e4acb24e6439c82ace7b27d35376010f36a", 0x4f}, {&(0x7f0000000900)="1941b200dfa805df59cf38baa6ff85c0ecdde07ad2d15e188cfd6fb2a3c7ccc79fb16893c60d99", 0x27}, {&(0x7f0000000940)="f02d86facf0011e0ebc62b20c27d51c9d89eab1c7576fbf26dca56ad4c0ec9f9398beeb8db67a8a2302764f101cf5ba80002f0c629ffdaf0be931de72fec2a765f769e3c8186e81caa5219748db21ce85d31069cf8f0f28f7aaf5aef5bfd812ddaf390f9c68dae29be9c3fd6988b406dc8821d16f7eeafd32d763ae0d9f2adf3027ffbc2208bdbc7fe3994795fcb00729d58a87c4d8210ca4ae4b54fd53bed", 0x9f}, {&(0x7f0000000a00)="30fc8fe320e0ceaa08785ce879cd9bbeb3c4247aac38d9179e9b39f4986aaa6f1db804064c853356aff09bea976c1213eed3c24827405bf7a97e234a457288c370a250e75a3e81a5c98d3e0e70835a68064eee4843ab74992ec507346f5e2573daa7fc040006af0269ca497d93f00bde6622a653c4c42d37ca71c20e863cef3f584b68957e51980e8fc9854aacd6ebae8f1ebea1fd00e4f890e6000ec686b8eac2f25b7f8e607b6a7edd187921f53acbc5530e2c91553047f1dcf4a6fd1dd167b86be2ae9545c31ab00f3eb9e069b1e9be0f8e136bdae64f9fd223d4d98d778f87ec5961366f917114e3d7486e8551dc1fb83c1455c707eb5ca5fd73c513b7b9ca90d5708cfe06e32fcf356b570856ef7f8fb1dbd94e2102c1a3a4263278fc1412a9799b89bce67387b774c4052f19b1e6e4ea50b676d91a3fb149b4cf7e6a1e630e76fa10a753e1d35d69adcd14de5380a7ba0183f1ba4134ac6764847b9fe9c1852d6d08d738118538d34d3a7a9338834751585fb276facf5d518a9b6c2e55a98a09eaef467015ea47a7fa6e96305a6d297282d6315177b794a9de19e59191ad15dfab7fde7bb6caefff8d0c35395cb28fbafb30f6f44278173df0191122c0c59454200c7c1b5b68b45a466fd6bb7d832de1dea1030f19c7fc1e07b319f49fa19a7737b69c014b41a1a17e7dda906856b1ec3451f403ae5943d002becdfcf019a03f2431ff19205fea581a5b2244bd55c280c70006ad61d28accb69931fbe6e8461d600598ea60d85a2ee493fbfb1a2b0997296fb732215460aa22b707ae1474076fc617b4b06e949f7d4a276dd7139bb09186c45a8c0830a89856a558590f50108adbe2519bc2ba9094e032203a53ade600d9a6e2eed7adbf2d6bb8e4e9b0f0874e9dde930825eb6b48e8f7ad801d286cd3312b4a3e1a930d92ec6df759a0fdbe11cdc058d61b04f5a31a62744d97df9c5d2256f377a97cd2236eeb31a81403ae94ba02dff85e0cc194d1e024ef88e36ce718e43ab4e6cd2ac2e0825f1513c9ecc35f2f39119ee34c47cbde9fc884be603c74389b95923242af680536c4525bb2307a94cc5e818c71bdf1f7f899c14328ccd07a61470bfd539056372d8afd283871160cc3205e711144ad204a1abaf6775a883aebe78a33fb2e07720b8b8306846ace99012947052ba918a809e4cdcdb11cc48d1e9f0d149213425ddf26a1a370211d85cb3ebbd76614ef5ffb48d99f02eb642903535c665eb7c7592f354cfc27828a968d55768f2284339bd196d094dbd70514b7ad48d6351f176762cce32b9e67e3d97e2c1177fdbb5f004b4bda48b8bf94bf7b9a0ac86b5a2896015d0f1c0c0a66fa8f05fde14f1f5de97e6a2c5c5407f46c78dac8bb5d4c303d0f799913ed57d75f55509e2e74243176b3b9833d3c6f999081b0c8338d2b61b06f30769a9e0bbb52b3525f8131cfbc9d3f9277e215ad6170890fd798ca62d60219b95f569748d94d96bdafbf5799ff2cf3ab0d2a091612191bdde75b8f19f7c715eabc556daf11243c37282bd57aace10274e134f2b8bcc29caf828bd52d67e6a4f9fd6e0cd64dc4a73ffff76cac6f65a19d7c6423372124322d1045a41dad215ae13020bc62f0fc13642cb694434ac2554960559351f142c9aea9d73a453c3a49e60ad703a1eeb9c42642e7547f47853f756793bd252c3e65875cba105360b85a5b9bead393a1e65b3e549a5c4c8d48d0540bf51ce6b148e866b3bd0fbbd841d22f5bb4abf2e587759dc533034643debd2ca206e71f83229d70e4acc1609128d053b6424e092ff1669db5bed6a78dd5fd071012f8c061afca5cce31a5a0bbee4654952577d0af4169e71b982d9b42faf2a29dcc3daf2d14017d8ada82371c5e420674faed69464c2abac134a25bf7968f9aa81d91e1e7acbacf696bdb3d80e2a655cf93656c4d88211e3cf448c725607f653d253add51ae0cb33c5387c2e49cef9ec5b4d63a43e544919e2289523df83c15d8a77a449ddce49d9828e59cb5564dd850e4c061eaf26b10b4d58052ed461f17b3bbf3c82f0d59d23ad4fb96dc26abe118d8b5daaaf77c205fc3ce00b35b0033fa9dd537bca53ab8a4b35123a6bd7d1d513377a67c3e9e5ff6d5424256aad7a3c3368cb0069c35bd74fa531baea5aaa158416dcbf8014eaee8e1672061dd74aa9c6f02e3c9ab8c71652019fe3e8e330d231d1d5ebaf1b5c83e1d5102893a5873b0ea2d6b3c281b31a379e45dd952748cb68a23150e83649facfeffb4adcf18c544b06987f9c8fcf3ed4e5f030c67c7053447284d349bfe19519a3a97dbbf741d37e541c6ddd697f8b707561fca3e19debbd46d142ae76bbc7393ec87efd748fcc9cfcbe9535fc22cec2e3b811952e2f96b45578b69da130dc96da3917db8cb2f0d429d7c2486a2ee9b8a03e73891401c85c092418dd74d59c9a7816afb7ec327463c0fd6ffdd248d6603e07c210e3d3153b600c634cf09666f38f69ce6fb07dd73e48469e845ed4736301a7e7da090e27ac7d77b69cbc377a5c8799aa0ed1a1235156799095e88ab69f835c7d9bb390f946f02a4c924e9e00cc26da6470ee33f024003cea6a35768864ed92a445c69b3275bdc12f3b2c6e064a6c0273c977e16929daaa637acf3484b6d5e91dd7d23cf0892ba99796065b1b1c4f6ecd9096ed7182c078afdfff7cc4bf63bf68622130a43afb5f10846beb390e4a3991abde1b6aaf9849b282b65f596f5cb09e631debcf7b73911357d1984608e893318a9ec8b16fd273e3823a97c78a4ab2374240d9ac372afea0545a5dfe2e4512848b7f77d42c09de3ef9a8a8aac516a6506ea1d89dc1c7653bc436ec3afef561d745e2315d9cefb9da3196da18e54d4acf334d357c233466e5c5456a11db68208c49cb7449e6e900788c39dfe4ca05f56c14bcf33ebeaf01191867fe76f37f8e822daef33ad6aa6be4903dc8d935ee61364c52c34727ae7800c44024e3ec8902fd41cff2deab30be3af286f3bdbb7c16ecde738d7580069a2a8865bdb2ab28ebf6f5128bf3e0a75844405d2cbd2cac2357b0c1792f4358ac27bb2c736ea9df9c430df95c4f4701af2192477612d75427ceb8e499741ce0f931e8dcb11f496a979d9fef7226d603f32da317006d2c092959adfaf21d23e4a5cd9373dfa17b33c86e2e842457f04398cc19d3e5ce638031b676295b351b0d5c8ca5b56fd1d99d9593d4ee7e659a705c9b37f705af1eb71707056578f5b305a6478b626360f32e65265be63e19a60b06bf5fe42f22b209ebb9a04b93d0430af1eded61c67a5ce0a5ad48573156ffbc1efefb514e5eb4fb41af65f0b42e9ae31db8e53694bc68afbcc0f6ba29f19f7e3d0c6f98c387e59470ed064ff7af4c22e75ae72a014035452625ce8f96eedbf9972013132c4d35f79677ba861bc2f40ae3ea82de5de8e40710a435f4b19d3f8043166d31b4e84c4c73d219a93bd20d1830ea4e005dc08ee9d7f1469a5dc35eb74473f11d6177e522787f6fdcdffb528f9b8933fe322cac9ac6c9f09b7c84dd9c9485bd10489f052a9c2a9f6f386f434f641d38051ce4189d11ed8481940add54bfdf43051edf3e9a2bf8b1b0bde9e92b93a47cc03d1e97b1e89195de16d8c826f928821339fdbba555a77725926534a4ab5b09add25d67c49e6739181fbfda2139fb86860c8b90f331145f10f5031e64f7d335e78c4d5426d28781a74e411e54cd4f4fcf5f8a09b36ee00e3c265d260653f251d9ba9ef01610baa87a99de985c9b7394b70edb563aa13ae2b1be558ded12af98019a1fccc479c416adb0f27d6fff84285bb793d7453d5cf7093be94bb7911756921591615f49c5a21c77d712cb43236131be093ca5c6a664d41fedc9e8e1dce9aec00ca0c1296d81fbd0b0a2aac3dbe660bb6ec8dfe2878b69cabfed89c45fa2307ee26e917daa13fbbe8f70f2610654ae17f448406bdad22df5a0ebd68698bbf4146839d627cbe823e793eddc5936cb8d3d6917c10b968c97eb4acd7df49c9c51b4a5217413843b9b8d92b8cd60c53eef7c35eda98b0480945d3acd26adefb0e657e61926971602dd868f837b002fda3b86aaf46b2dd7fcfa9cf146b49c48a1b33052b86ee9bad64c45dc582cb5b3e670fc6ca8dbcfb1064c4adcd99a3a78d55b316bbbfbe7f9922408be01acec0e00d6605f1b0e63efb4cadc5bd58b18d4cacd0810338416341720fadb5778b400a02a29fb25d23c401599bbc3fa0a263a5d7281f35e62cb95360bb2ebd7511904f005fc06044748e3e39dbec4cb969556ba34599f65e974287c4d06fa40209021815718bb3ee27387434fcdcb97a1dcbf06a26ea6de2031a2652fe15468304a87b61d7c098ab2459798b82f3a1389659d34fdb9ea03ee8b0c21f91cc8d761f3a1acd4e0c9dfcdaea2f363fad0d22ceaa8ca4bd384d30f871f86149f3a8f7d05e0e4dfc59670452f48c6b0c76fbb271f8cf0075a2e5cecfcc3b613d355283fed1e5bebb0ebf80e1650e068b17a710387cf61c8de54313742f8d9260c250e1385c0fed1e6c25efd10370a87272722f98011e59d23c475ed95f587030bfaa092ca68a41a5711d3a27424604d7e10e1bb7b05da5ac91a11469ce4baaf784410857dbae16c4dd82dffadae56f45140d8ea00a1168a25b8da8e0b5f91a4803c24bb2abda261d820e4a3467b21b83642a1e137f6c3a6f88a0a78a82593bb26e096ead54de0c4abab4ca4c69676851dab3d5a0d2426862a1ccab41fc7837978d1e4d7654bfdf05c82c9e6661675fcb8fa52abb1a5e22bc75f6b4d67c29ea1e36bd343234f56e2302bd53eda593d8bc57b011615b1e50937ff6c9811076cbe44a54c045deb1a2d6061ef6873895b915ea0c31ccc89701090d2601b8241ec7dfb6a47e1d8c6bede0ebc0dbc4bd38d3660c94bac0346a756b80fe8f60313048116aa9223195a5d7c48182f93b592f013f452af4cdb7c2bd47d0f70bd6d4a60a619d64d977f6186c6c771f5d0f7a321058c41de5b0e531612c7f9d405f93fd25fa252edb4f8118776d930c74e6db02a7df055b74d9fe58aaa820ba50ad75d9c1c839dcb65e1e810eda21e6c46b8bdbf5f8f10eabd1522b072b80a0e183a0c923970e50c465efd3a129c2e5403a80355423e34687a2e1f80479fb26c4e1ee2538cf7092ae2dd430d0ad70641eec4ab126c7d8b1dbff239e1b5991e4c06d14f891ed03dab5b9ddbdf5102c2a1a23fa9bf9be8683ea1a192e8c41764407a74a572786a3602c6ce796e60ea60a01ebe75b5e74edd97328aa3129262d1cb94cbc1f82c60e046519ce8166ced3845083ec9c3cbf0c1c1b1a00951a7aa94f52c576bb6c3792c829c6b3757dcc0650d970e4db312208ad9d566d12a652af8a938d9c0d92d2a8a65641c0d34fce526e6e44cf3c6f986c55c6dd6edaeab3b4f2e5d33e4b33668a0f871b6340fd1bc55be292f379b0a3d7549467bbc42e9f7b354f92b736d27a39fa66878068efe5ae609abc680f0f37a49df0cf765876fdb66ac5f6339a7e57e62ff9337d08158687465a2b9309a99cf98ea52e990e9f584e17eea045866394d0465e2fde2fe9d60d5b312ad57c496ca0d87b87fc451f96dcd86c169b323286dcd4f93fd9f834546d15ab680ea923b72bce1c46cb09535c055ae07d15d2799531220ba71d19552be480095fe095dcd9772065c0381e14e6c49c0660fab8818713cd62f9cba36c2199a0d78a5b30d05744c395f15db57e8bf30709fe8fabbae8c787cb29c15bf391128b4f51c66f739e6763", 0x1000}, {&(0x7f0000001a00)="363ecfcce1ce9f75184dda428f865b83469e6c36ad2d3f03408b78907edd3edd2187cd13d131b639fedb4e08b1cb8b802730a5bfd945cac5c88e97971fab4bb8e2956f83efbf2eb98e09356580ec71e8eec50a092b50a1f9da7a84b25a08f78b27b03641d7f3d00455d2e279b0ecc3b0a7e8c13f12837a7c3a7e55a37b18b15be55b6977efded1f4f81458bc653e6a5b9e6ee17c1d12ec4cef5516cd6477da37de72307a31f7998e46789349", 0xac}, {&(0x7f0000001ac0)="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", 0x1000}, {&(0x7f0000002ac0)="20c583c05f94fbd44af46293f3140913c1cd351ea48d155054e59efe7493fbb8a8e3188715e85b688d446e674340931cdd294026d80ce1b04471172a35418ebe42279cfd721de7bf2683da80ab8a7df1d6d4a9553f260e41798e89ab490e53ba7fc07a364678cd712dce72cfc751771c92a0af73c7e3d0ee2212b8d9818e0e87dbcdb0140823dc28b1cd79f5dd8866701a23811a69be5dae9827e0d985ab827dfd7ecd39d29c6f0fc4bf27f94cef130c99899686144973b48c6d5c335181b0bb74a6a7d67f5a552e688e4a", 0xcb}, {&(0x7f0000002bc0)="947bd7d71744e1f38f9a0343471a9a21389ea761cb45653e56c406d462c0c5fdec3b1fafcbeb79c6c06408efe64613dd6a08756bea7b83c132a09eebc8db0a029a2f453f7b36b9e59eabcc80537c53500e56b0af9c60e3269b761e1fce89b00f4aac39f16863e287b4e28b896222669713242eac7ea3d959e1bc4d94ad87f89f4d2790999f5b0d7c6ad07856b0302f12e6e37378cbcae3beee169e41a21e17836c678eb3d5375988886ac56c33466d1be9edb7b6e67fa01a6da100bb67e9c9c97014a72141", 0xc5}, {&(0x7f0000002cc0)="048b0d2381c764636a4c62572972a844c07cd7847f218e0277e44619bb24a8a210963ab5c1ab123f4441d20428d557ce02eddd214f996f28abee1a65e064ad073fad40e896c6088c07994602c3edae558bc0b3d9aa1f23b7ca9cfdd3511688fa995260f6533ace49416236d8203168e11621b9b371e87a0ee86c2fdb566f4386577b1726e51c9aacc2f9222f18b673e7a4fdc129fd3d0420a31ada4dc79962b1", 0xa0}, {&(0x7f0000002d80)}], 0xa, &(0x7f0000002e80)=[{0x38, 0x0, 0x7, "e74de17fc11c646fa5c648e60f403fa9dcd6ec825016c188fb6b6ded145affef0851b5c5dbeaa4"}, {0x58, 0x107, 0x4d5, "fb3d4016b2133c144aa73aea20b5f016af33d376860138c616f7ddbe8c81cbb11317e59d2a5788b23c441eb308425f2a0ee7a32d51e15541200cac6998b686390b6030"}, {0x18, 0x107, 0x7, "9d76"}], 0xa8, 0x4000}, 0x3}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002f40)="efb927bc25ff95fad0287eaf86bccb7ae8878a30f17abade744f6ffc22bdc71d2dac0b0324e893b230caa534c81acb0c23b3f80a5d1287efa029e255dbeccc5e347bdb96a38f15e7c36a2bc95c13d6b1d5c998b5c0096138bae22f2899d13974faa90381a8410843985f3dbe4a7ca5922cd8b97536485f8f", 0x78}, {&(0x7f0000002fc0)="52410350a15cb5e74b55d165083041d9ae3bb3d18bc300dc7d75d84a2c20c4222bb1ad684a14e58eb41d3518583df45390d6574d097a96f36f2d62c9c6f025fcbf7506b30a1d71d4987b9f11563a0e9a25", 0x51}, {&(0x7f0000003040)="9bb7176d3e1946c09fde3d787f194cdca02b307313d881bf17d34038c5c9baecd7902787cd247bad7f474c9c494baa7af9a98a26e0d9a998f3f2a4e677138dc800180a26c9bde0677fc399989357a7fdb6d5898c153d15fc8142d7babb5f79e73ac5726c88daa867b54132428a7ae1d6f0b5c5c38e4513d33302df6d2327e014a2b6037dc873c4deaf56eb151ae4c2f43a5fdd0946", 0x95}, {&(0x7f0000003100)="284046eac96e9b9426234f35c33581ec27674f2ad9bc1dcdbc1b27710bd62c9c9a5eefbfb4881a2382093dcc090409434e833e2a46dd160a40ce4a5857949cbe67c6cd861c4de0c51ebdfb898b764633555d5e986d6a241fe76c2bc5676dfb434a2c074850442ae9a23104bfb5173dbc76c6e0d4e20c76b3d54593ee5ac0695c8227d9a8e56d2da7db8f348228d8b36b635c0d66e17672515b2f8936cbc862bc", 0xa0}, {&(0x7f00000031c0)="89b194f3e564195e7b3c8f0d7d0f7af4ddac8e0b6a878c9ad5d8dcd5c604a91b214bcf9bc5b1bf18e8b62424b829d2242dfbdc6b2550d37cf8a6943bd830e623ef392f3c31d98e2bd901f3f2985d308d3b4405a958045bddc0a2", 0x5a}, {&(0x7f0000003240)="aed8d49a9cd6af3cdcc2e90dfac1af871477af430c8736b8c2d22e5259abc9341cf20d83f2f48729f06f1432cf1e5d1c3cc340449aa1557858fde4d46f991af006b8ae08875ab4c8df0a67ff1861f5d57849f6f51fed8755bfc8c07d32cd7f8accb59a1ce2e910b64bbf26a1fbafcd8beac77e5a8a5494cc4558194f14877d45ecb7a08e0f96de0176d5211064330b967c464a055993d577bbc01ee89f5ef00ca958b09d3c39c47ccbf123f9632d9229ade92e19feb848fd03d6edf6f7dca0", 0xbf}, {&(0x7f0000003300)="141a432024a7219ffad9ee1f9d74a441219a3b97ab3cf0e1332cc138e43c", 0x1e}, {&(0x7f0000003340)="e9f6b6c842b5785a491d22", 0xb}, {&(0x7f0000003380)="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", 0x1000}], 0x9, &(0x7f0000004440)=[{0x18, 0x139, 0x1, "9d5bbf80"}, {0x70, 0x117, 0x3, "1d52cfaa5cbeff4a160c621c3c133739d190c252bea1c9cac6b04593d3208feb565ca7278e2411ca970e0972774d1527c3fb10f328c7424f5af14ccad4b13179c45ca42008fa5d64ee491443e834b1cf95dd45b61370215498542ec16798"}], 0x88, 0x80}, 0x7f}], 0x4, 0x0) r1 = syz_open_dev$mice(&(0x7f0000002d80)='/dev/input/mice\x00', 0x0, 0x1) recvfrom$unix(r1, &(0x7f0000004600)=""/229, 0xe5, 0x20, &(0x7f0000004700)=@abs={0x1, 0x0, 0x4e24}, 0x6e) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000000)}}, {{&(0x7f00000001c0)=@vsock, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000380)}}], 0x2, 0x0) [ 1295.398918] netlink: 'syz-executor5': attribute type 5 has an invalid length. 00:26:06 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xffffff91, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:06 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_buf(r1, 0x0, 0x30, &(0x7f00000001c0)=""/156, &(0x7f00000008c0)=0x9c) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000002c0)={0x8, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e22, @local}, {0x2, 0x4e24, @broadcast}, 0xfd, 0x101, 0x2, 0x3, 0x1, 0x0, 0xcc, 0x0, 0x8001}) seccomp(0x1, 0x1, &(0x7f0000000180)={0x9, &(0x7f0000000040)=[{0x1000, 0x212f, 0x0, 0xf682}, {0xa7, 0x3, 0x9}, {0x8001, 0x101, 0x80, 0x7fff}, {0x3, 0xfff, 0x7f, 0x1}, {0x2, 0x4, 0x1, 0x8}, {0xad, 0x8000, 0x8, 0x2}, {0x6, 0x9d, 0x6, 0x9}, {0x9, 0x1ff, 0x80000000, 0x3}, {0x0, 0x8, 0xd74}]}) membarrier(0x10, 0x0) splice(r0, &(0x7f00000006c0), r0, &(0x7f0000000880), 0x1, 0x2) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) r2 = open(&(0x7f0000000680)='./file0\x00', 0x200000, 0xa3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000340)={{{@in, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000440)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000480)={{{@in=@multicast2, @in6=@dev={0xfe, 0x80, [], 0x14}, 0x4e21, 0x8000, 0x4e24, 0x1, 0x9, 0x20, 0x80, 0x23a, 0x0, r4}, {0x712, 0x2, 0x0, 0xffffffff00000000, 0x7f, 0x6, 0x4, 0x1}, {0x401, 0x100000000, 0x7, 0xccf3}, 0x9, 0x4, 0x0, 0x1, 0x3, 0x3}, {{@in=@local, 0x4d4}, 0xa, @in=@local, 0x3504, 0x2, 0x3, 0x7fffffff, 0xfffffffffffffffc, 0x7, 0x7f}}, 0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000100)=0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x14, &(0x7f0000000580)=0x100, 0x4) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000700)={r3, 0x1, 0x6, @dev={[], 0xd}}, 0x10) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000600), &(0x7f0000000640)=0x4) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000800)=ANY=[@ANYBLOB="0000000009000000000000000000000000000000000000000000000006fdba55bc96b4656950bd50be0c7a64237894cd1c5df718ed7c93752567159cf1ff8a85dcaa6f5c6337048771c278f5af"]) setsockopt$inet_buf(r2, 0x0, 0x2e, &(0x7f00000005c0)="f2ce2f9bab80b6835a3c52cc4aed8ff60deb9dff2f8b7fe97db90be2d48b4d9b40651b8791fede95969fc5c5ae0b0a209e4f42b7e1ee3b6e8e86afb56ada", 0x3e) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000000)={0x0, r1, 0x0, 0xdf, 0x5, 0x8}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup/syz1\x00', 0x1ff) sendto$inet(r1, &(0x7f0000000000), 0xc3c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) [ 1295.508533] netlink: 'syz-executor5': attribute type 5 has an invalid length. 00:26:06 executing program 5: r0 = socket$inet6(0xa, 0x2000000000000001, 0x8010000000000084) r1 = socket$inet6(0xa, 0x3, 0x7) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") setsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000040)={0x200, 0x102, 0x1, 0x8}, 0x8) socket$inet6(0xa, 0x2, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="01000000e3eb083f6fcd7a9c559133cd03d09da10900cc113a8cc0b8f188c3063583bd26f0dad1377375ad638ac24035a48b69dfeb8fcb3cdcf0f6a42c8b5b3f4306618c32dc1d5013172d7a095c74f0a0a1a0b1a4951a56b766770c0dfc70ffa3e95ac4edd04eebac746322a1823865e4fdc238cf18fa019597e29f1824cf55b1631f6c30fe7386774ebc89d6c4b28092e46f5eeb5f1a8b3fcc3fae94ba5225450000"], 0x1}}, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2f, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @local}}}, 0x108) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x2) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x2000, 0x0) fstat(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r2, 0x400454ce, r3) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r4, &(0x7f0000000100)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x4000, @dev, [0xf401000000000000, 0x300000000000000, 0x0, 0x0, 0x4000000]}}, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x98) socket$netlink(0x10, 0x3, 0x0) [ 1295.555548] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:26:06 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x40000000000000) r1 = dup3(r0, r0, 0x80000) write$P9_RWSTAT(r1, &(0x7f0000000040)={0x7, 0x7f, 0x2}, 0x7) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000140)=""/213, 0xd5, 0x10000, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000b94000)=""/246) close(r2) getuid() sched_getattr(0x0, &(0x7f0000000100), 0x30, 0x0) fstat(0xffffffffffffffff, &(0x7f0000004280)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000180)) ioctl$TCSETAW(r3, 0x5407, &(0x7f0000000000)) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') write$P9_RXATTRCREATE(r4, &(0x7f0000000140)={0x7}, 0x7) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000156, 0x0) 00:26:06 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x2427, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:06 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x1f4, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:06 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x8, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1295.747239] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:26:06 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x1, 0x82000) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, 0xffffffffffffffff) 00:26:07 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000080)={[0x100000000, 0xff, 0x10000, 0x5, 0x3f, 0x0, 0x8001, 0xffff, 0x9, 0xffff, 0x400, 0x3, 0x2, 0x4, 0x37a, 0x80], 0x5000, 0x10000}) capget(&(0x7f0000000040)={0x20071026, r1}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0xffff}) 00:26:07 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x5, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1295.884565] IPVS: ftp: loaded support on port[0] = 21 00:26:07 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0x7]}, 0x10) 00:26:07 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x12063f3de7e, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:07 executing program 3: openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffff7fffff}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x2}}) 00:26:07 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xffffff91, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1296.178644] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1296.188959] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1296.215004] device bridge_slave_1 left promiscuous mode [ 1296.220576] bridge0: port 2(bridge_slave_1) entered disabled state [ 1296.284670] device bridge_slave_0 left promiscuous mode [ 1296.290192] bridge0: port 1(bridge_slave_0) entered disabled state [ 1296.348982] team0 (unregistering): Port device team_slave_1 removed [ 1296.360546] team0 (unregistering): Port device team_slave_0 removed [ 1296.370414] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1296.397602] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1296.457494] bond0 (unregistering): Released all slaves 00:26:07 executing program 5: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f0000000040)='./control\x00', 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./control\x00', &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0xeabd3a6a31000105) close(r0) inotify_init1(0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./control\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) socket$packet(0x11, 0x2, 0x300) 00:26:07 executing program 3: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x600000000000000, 0x100) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000080)={0x2, 0x16ac}) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f00000002c0)=[0xee00, 0xee01]) fchown(r1, r3, r4) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x2, 0x0, 0x100, &(0x7f0000000100)=[0x0, 0x0], 0x2}, 0x20) ioctl(r5, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000340)={'ip_vti0\x00', &(0x7f0000000300)=@ethtool_ts_info={0x41, 0x80000001, 0x9, 0x3, [0x4, 0x8, 0x5], 0x5, [0x1, 0xfe, 0x80]}}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000380)=0x80, 0x4) ioctl$NBD_SET_FLAGS(r2, 0xab0a, 0xff) r6 = msgget$private(0x0, 0x40) msgsnd(r6, &(0x7f0000000180)={0x3, "1cda6976de263b2297252b44e13c5fc9de7a7d49cca81d247835e3d4c33ca309e1bc3f1ba09dd7cfd46ce6fc052d9aada0d7f3287fa76abeccda6b80bfc3523850658c2485c41a12ff419d4ab94372d7ff5e3f"}, 0x5b, 0x800) ioctl$RTC_AIE_OFF(r1, 0x7002) ioctl$NBD_CLEAR_SOCK(r2, 0xab03) 00:26:07 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x3e8, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:07 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x1000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1296.542548] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1296.588518] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1296.627899] block nbd0: Receive control failed (result -22) 00:26:07 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xea03000000000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1296.650860] block nbd0: Device being setup by another task [ 1296.676074] XFS (loop3): unknown mount option []. [ 1296.714240] block nbd0: shutting down sockets [ 1296.718597] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1297.001470] bridge0: port 1(bridge_slave_0) entered blocking state [ 1297.012384] bridge0: port 1(bridge_slave_0) entered disabled state [ 1297.025052] device bridge_slave_0 entered promiscuous mode [ 1297.067571] bridge0: port 2(bridge_slave_1) entered blocking state [ 1297.074586] bridge0: port 2(bridge_slave_1) entered disabled state [ 1297.081929] device bridge_slave_1 entered promiscuous mode [ 1297.118699] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1297.155615] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1297.248814] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1297.275410] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1297.400142] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1297.408162] team0: Port device team_slave_0 added [ 1297.452190] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1297.459507] team0: Port device team_slave_1 added [ 1297.482383] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1297.507567] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1297.532745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1297.557822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1297.759641] bridge0: port 2(bridge_slave_1) entered blocking state [ 1297.766022] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1297.772589] bridge0: port 1(bridge_slave_0) entered blocking state [ 1297.778968] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1298.511672] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1298.582396] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1298.653497] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1298.659660] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1298.667111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1298.732425] 8021q: adding VLAN 0 to HW filter on device team0 00:26:10 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getrandom(&(0x7f00000000c0)=""/98, 0x62, 0x1) ioctl$UI_DEV_CREATE(r0, 0x5501) write$uinput_user_dev(r0, &(0x7f0000000e40)={'syz1\x00', {}, 0x15}, 0x45c) 00:26:10 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x1392, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:10 executing program 3: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x600000000000000, 0x100) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000080)={0x2, 0x16ac}) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f00000002c0)=[0xee00, 0xee01]) fchown(r1, r3, r4) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x2, 0x0, 0x100, &(0x7f0000000100)=[0x0, 0x0], 0x2}, 0x20) ioctl(r5, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000340)={'ip_vti0\x00', &(0x7f0000000300)=@ethtool_ts_info={0x41, 0x80000001, 0x9, 0x3, [0x4, 0x8, 0x5], 0x5, [0x1, 0xfe, 0x80]}}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000380)=0x80, 0x4) ioctl$NBD_SET_FLAGS(r2, 0xab0a, 0xff) r6 = msgget$private(0x0, 0x40) msgsnd(r6, &(0x7f0000000180)={0x3, "1cda6976de263b2297252b44e13c5fc9de7a7d49cca81d247835e3d4c33ca309e1bc3f1ba09dd7cfd46ce6fc052d9aada0d7f3287fa76abeccda6b80bfc3523850658c2485c41a12ff419d4ab94372d7ff5e3f"}, 0x5b, 0x800) ioctl$RTC_AIE_OFF(r1, 0x7002) ioctl$NBD_CLEAR_SOCK(r2, 0xab03) 00:26:10 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x8e00000000000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:10 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0xffffff7f]}, 0x10) 00:26:10 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x6000, 0x1) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) sendmmsg$nfc_llcp(0xffffffffffffffff, &(0x7f0000005300)=[{&(0x7f00000002c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "a73b88b5b817b4c4344603b0e217c3644876379c003963d00adc6053a66b936cfb9e794cfdb2d848bc2b34628f8770dbe6748a38559c5f495542fbba1a1c01"}, 0x60, &(0x7f0000000240)=[{&(0x7f0000000340)="ab937437d0d82715b6842c12a6eea233bfb6d522b960c0613f4f91f4eaf95b676dbbf36eaaa9627d168e986c2e6fe158eb99d384de3d13e02646e33a64faeda8482117dcbc2a8b0f5a9aac1aead165ed2c9607ce4df892bf4296efba6b628e4e26fd37ed3b26adf6776f531ff75ac8af128499430597444aec12e9ee36413b8b7198fc6a0ff5c66468167b6d5eabdaf06fde4c6c620f54bcac8f5716976a9d224d4ef8a4630d158a465595ab9e4b8efb64a9", 0xb2}], 0x1, &(0x7f0000001340)={0x10}, 0x10}], 0x1, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f00000000c0)={0xfffffffffffffbd3, 0x0, 0x1f, 0x0, 0x80000000, 0x1f, 0x4, 0x3f, 0x0, 0x3, 0x1, 0x8}) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x345, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={[{@rtdev={'rtdev', 0x3d, './file0'}}]}) [ 1299.186887] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1299.198459] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] 00:26:10 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="04010000100001000000000000000000e0000001000000000000000000000000ac1414aa00000000000000000000000000000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="e0000001000000000000000000000000000000002b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f8ffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x104}}, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f00000001c0), &(0x7f0000000200)=0xc) [ 1299.243015] block nbd0: Receive control failed (result -22) [ 1299.271274] block nbd0: shutting down sockets 00:26:10 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r0, r1, 0xf, 0x1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1028}, 0x2c) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000001b40)={'vcan0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x2}, [@ldst={0x4}]}, &(0x7f0000003ff6)='syzkaller\x00', 0xffffffffffffffff, 0xc3, &(0x7f0000000140)=""/195, 0x0, 0xfffffffffffffffd, [], r2, 0x6}, 0x48) 00:26:10 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000580)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r1, r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) sendfile(r0, r3, &(0x7f0000000000), 0x3ff) 00:26:10 executing program 3: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x600000000000000, 0x100) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000080)={0x2, 0x16ac}) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f00000002c0)=[0xee00, 0xee01]) fchown(r1, r3, r4) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x2, 0x0, 0x100, &(0x7f0000000100)=[0x0, 0x0], 0x2}, 0x20) ioctl(r5, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000340)={'ip_vti0\x00', &(0x7f0000000300)=@ethtool_ts_info={0x41, 0x80000001, 0x9, 0x3, [0x4, 0x8, 0x5], 0x5, [0x1, 0xfe, 0x80]}}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000380)=0x80, 0x4) ioctl$NBD_SET_FLAGS(r2, 0xab0a, 0xff) r6 = msgget$private(0x0, 0x40) msgsnd(r6, &(0x7f0000000180)={0x3, "1cda6976de263b2297252b44e13c5fc9de7a7d49cca81d247835e3d4c33ca309e1bc3f1ba09dd7cfd46ce6fc052d9aada0d7f3287fa76abeccda6b80bfc3523850658c2485c41a12ff419d4ab94372d7ff5e3f"}, 0x5b, 0x800) ioctl$RTC_AIE_OFF(r1, 0x7002) ioctl$NBD_CLEAR_SOCK(r2, 0xab03) 00:26:10 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, "73797a310000000000004b1a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000800"}) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000000)='syz1\x00') read(r0, &(0x7f0000000d00)=""/4096, 0x1000) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) 00:26:10 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000002c0)='/dev/bus/usb/00#/00#\x00', 0x8a7, 0x200) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, &(0x7f0000000300), &(0x7f0000000380)=0x60) r1 = socket$inet6_udp(0xa, 0x2, 0x0) recvmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/79, 0x4f}, {&(0x7f0000000100)=""/173, 0xad}], 0x2, 0x0, 0x0, 0x100000000}, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r3 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x4, 0x4, 0x7}, 0x2c) rt_sigreturn() setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000240)=0x1e02, 0x2) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000040)={r3, &(0x7f0000000000), &(0x7f000089b000)}, 0x18) [ 1299.507675] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1299.562119] block nbd0: Receive control failed (result -22) [ 1299.583533] input: syz1 as /devices/virtual/input/input28 [ 1299.596303] block nbd0: shutting down sockets 00:26:10 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x300000000000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:10 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x1100, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:10 executing program 3: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x600000000000000, 0x100) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000080)={0x2, 0x16ac}) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f00000002c0)=[0xee00, 0xee01]) fchown(r1, r3, r4) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x2, 0x0, 0x100, &(0x7f0000000100)=[0x0, 0x0], 0x2}, 0x20) ioctl(r5, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000340)={'ip_vti0\x00', &(0x7f0000000300)=@ethtool_ts_info={0x41, 0x80000001, 0x9, 0x3, [0x4, 0x8, 0x5], 0x5, [0x1, 0xfe, 0x80]}}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000380)=0x80, 0x4) ioctl$NBD_SET_FLAGS(r2, 0xab0a, 0xff) r6 = msgget$private(0x0, 0x40) msgsnd(r6, &(0x7f0000000180)={0x3, "1cda6976de263b2297252b44e13c5fc9de7a7d49cca81d247835e3d4c33ca309e1bc3f1ba09dd7cfd46ce6fc052d9aada0d7f3287fa76abeccda6b80bfc3523850658c2485c41a12ff419d4ab94372d7ff5e3f"}, 0x5b, 0x800) ioctl$RTC_AIE_OFF(r1, 0x7002) ioctl$NBD_CLEAR_SOCK(r2, 0xab03) 00:26:10 executing program 5: r0 = epoll_create1(0xfffffffffffffffc) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xfff, 0x200) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f00000000c0)={0x1, r2}) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x7a, &(0x7f0000000100)=@assoc_value, &(0x7f0000000140)=0x8) r4 = gettid() kcmp$KCMP_EPOLL_TFD(r4, r4, 0x7, r0, &(0x7f0000000000)={r0}) [ 1299.728772] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1299.769716] block nbd0: Receive control failed (result -22) [ 1299.806292] block nbd0: shutting down sockets 00:26:11 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0x600000000000000]}, 0x10) 00:26:11 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$btrfs(&(0x7f0000000280)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x7ff, 0x7, &(0x7f0000000600)=[{&(0x7f0000000300), 0x0, 0x2}, {&(0x7f0000000340)="979476daea10e25de37035792d196f1bd3c82e077e7d83c316136de741072cc0287318d51d681e7459fcb335c73a6b7a9212d5386059aaf6b36532c1aa852cf04037fdbc48d395b09010a1352e722c116cb9f6249041825a154d2105180f5fca422b13386726865aa039319f42a7651e", 0x70, 0x568}, {&(0x7f00000003c0)="88f8d2f77324d362fa57aeafdcbe7b43eba3ff885c0c7e7f78d0", 0x1a, 0x8000}, {&(0x7f0000000400)="6c04e83841bce0cd151a2afaad3e62b01bde25b88c61952ec8998a3f57ae11b74102267e0e1b4c1902d081060b1b028454acd1e627033be08816fcb87ea81df54edecad26cd3ccedd521c0b846b885be5a814192f034cd629b8907a4c0ba81c0f18d1d2e99a05773231657b534fa9e2cf290a21ed9c1b0a8cab00884bd9e53044fa151408d41c0d73a017e1731f6358211724b6a843505c321455a13cabb98f1ae65ccdb26b66a23e8a20c0c83e46b7637734b2565e7", 0xb6, 0x2008}, {&(0x7f00000004c0)="33cedfa09733af05d623b022801db9cc23785346c1533247457ee561afa155db422ff62b2d7688e52cc252c615ce2179c31dbe053c44ffbab2905a7f5ba5decde0fefbafb604b579ad4b0f0cae6064bbc204ba489bb60be8724dfb0dbd09aa7d8d5ff424109a1f7e85c372968af4df46fa0e69", 0x73, 0x7}, {&(0x7f0000000540)="c9c0b0e071c083409d428d3d9e3344abe7c172dc", 0x14, 0x8}, {&(0x7f0000000580)="48cef300794db8d66833e5a0872bd962739028286023d0079d98875610f9ae74f4933ad7fc2e9ea95d9d3b98e90458fa1eef6c72432dc8a593deb018927d8410401a3ec1ba598c6bbc8ea76e2bcd36a807bee31d7c586e95", 0x58, 0x7f}], 0x20000, &(0x7f0000000780)=ANY=[@ANYBLOB="666c7533686f6e636f6d6d69742c736d61606b6673d20000003d6e746673002c0025e68c4cec6b1cdfbc51bb9e7a999676dbc155d542cb638dd032dcdf278488bf534d690354bbc18517946a43a0fcb48a170adf4db7f1d4474538d4c3983012c76fc486052fcd8102dd914213872cadffb0109c13d426a7c14fb32bb6defb8f5dec536ace7064c8f56ef8"]) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[]) creat(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e3a66696c65302c776f726b6469723d2e2f66696c6531c659245c"]) setxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay/nlink\x00', &(0x7f00000001c0)={'U+', 0x23a8}, 0x28, 0x0) 00:26:11 executing program 3: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x600000000000000, 0x100) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000080)={0x2, 0x16ac}) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f00000002c0)=[0xee00, 0xee01]) fchown(r1, r3, r4) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x2, 0x0, 0x100, &(0x7f0000000100)=[0x0, 0x0], 0x2}, 0x20) ioctl(r5, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000340)={'ip_vti0\x00', &(0x7f0000000300)=@ethtool_ts_info={0x41, 0x80000001, 0x9, 0x3, [0x4, 0x8, 0x5], 0x5, [0x1, 0xfe, 0x80]}}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000380)=0x80, 0x4) ioctl$NBD_SET_FLAGS(r2, 0xab0a, 0xff) r6 = msgget$private(0x0, 0x40) msgsnd(r6, &(0x7f0000000180)={0x3, "1cda6976de263b2297252b44e13c5fc9de7a7d49cca81d247835e3d4c33ca309e1bc3f1ba09dd7cfd46ce6fc052d9aada0d7f3287fa76abeccda6b80bfc3523850658c2485c41a12ff419d4ab94372d7ff5e3f"}, 0x5b, 0x800) ioctl$RTC_AIE_OFF(r1, 0x7002) 00:26:11 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xe010000000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:11 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000019c0)=0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x50000000000) ioctl(r2, 0x0, &(0x7f0000000280)="0a5cc8") r3 = dup3(r1, r1, 0x80000) fcntl$notify(r2, 0x402, 0x2) timer_create(0x0, &(0x7f0000001940)={0x0, 0x0, 0x2, @thr={&(0x7f0000001780)="67b2513bf0fdf94d48bc109fd030fd6fba6767d19e0e7a3fe11d29377e307b11fcc5630c93525459eb4d71b68eb3bd3c049352ce6a67a54312e525b0101728e08c21041695ea8c826cdc28", &(0x7f0000001800)="a2cb11d6df6926ea44d4316a595baf9d23a1ae636132c358ee381474c69dedcd5e0d1740143c9cad8578913a7a6e74425348298d05819f89167bad5b1bccb5f099166a0695851de65e5b629fc7bf71f13cc7ac7284e1d5ee20659d191b5447fa47fd34d057173d6e42565516e52dbcc21249b8571ebed06bde0548d40f6557a3ddf43b7e3682dbac36864f685005a88a5e525e2f90cf70c92fe0c7e32c48ef2c91dbb8998de784c50a9fd449100228a9a24d9d276600c99ab6eefb"}}, &(0x7f00000018c0)) modify_ldt$read_default(0x2, &(0x7f0000001740)=""/13, 0xd) clock_getres(0x0, &(0x7f00000000c0)) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000240)=0x0) getpgid(r5) dup3(r2, r3, 0x80000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000588ff8)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r7, 0x7, &(0x7f0000002000)={0x1}) ioctl$VHOST_SET_OWNER(r3, 0xaf01, 0x0) rt_sigqueueinfo(r0, 0x32, &(0x7f0000000080)={0x1f, 0x64a, 0x3, 0xcf}) unshare(0x400) fcntl$lock(r7, 0x7, &(0x7f0000010000)={0x0, 0xfffffffffffffffd, 0x3ff, 0xfffffffffffffffe}) flistxattr(r1, &(0x7f00000012c0)=""/27, 0x1b) tkill(r5, 0x819) r8 = dup3(r6, r1, 0x2) process_vm_writev(r4, &(0x7f0000001600)=[{&(0x7f0000001300)=""/39, 0x27}, {&(0x7f0000001340)=""/211, 0xd3}, {&(0x7f0000001440)=""/211, 0xd3}, {&(0x7f0000001540)=""/155, 0x9b}], 0x4, &(0x7f0000001700)=[{&(0x7f0000001640)=""/67, 0x43}, {&(0x7f00000016c0)=""/64, 0x40}], 0x2, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) bind$unix(r6, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e24}, 0x6e) ioctl$SNDRV_TIMER_IOCTL_START(r8, 0x54a0) getsockopt$inet_dccp_buf(r3, 0x21, 0x2, &(0x7f00000002c0)=""/4096, &(0x7f0000001900)=0x1000) 00:26:11 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xfffffffe, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1300.027157] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1300.039202] overlayfs: failed to resolve './file1ÆY$': -2 [ 1300.072580] overlayfs: failed to resolve './file1ÆY$': -2 [ 1300.085876] block nbd0: shutting down sockets 00:26:11 executing program 3: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x600000000000000, 0x100) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000080)={0x2, 0x16ac}) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f00000002c0)=[0xee00, 0xee01]) fchown(r1, r3, r4) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x2, 0x0, 0x100, &(0x7f0000000100)=[0x0, 0x0], 0x2}, 0x20) ioctl(r5, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000340)={'ip_vti0\x00', &(0x7f0000000300)=@ethtool_ts_info={0x41, 0x80000001, 0x9, 0x3, [0x4, 0x8, 0x5], 0x5, [0x1, 0xfe, 0x80]}}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000380)=0x80, 0x4) ioctl$NBD_SET_FLAGS(r2, 0xab0a, 0xff) r6 = msgget$private(0x0, 0x40) msgsnd(r6, &(0x7f0000000180)={0x3, "1cda6976de263b2297252b44e13c5fc9de7a7d49cca81d247835e3d4c33ca309e1bc3f1ba09dd7cfd46ce6fc052d9aada0d7f3287fa76abeccda6b80bfc3523850658c2485c41a12ff419d4ab94372d7ff5e3f"}, 0x5b, 0x800) 00:26:11 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x1100, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:11 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x3563010000000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1300.182402] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1300.217126] device bridge_slave_1 left promiscuous mode [ 1300.222038] IPVS: ftp: loaded support on port[0] = 21 00:26:11 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xffffffff00000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1300.239012] bridge0: port 2(bridge_slave_1) entered disabled state [ 1300.335619] device bridge_slave_0 left promiscuous mode [ 1300.341400] bridge0: port 1(bridge_slave_0) entered disabled state 00:26:11 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x200000000000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:11 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xfc00000000000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1300.401283] team0 (unregistering): Port device team_slave_1 removed [ 1300.410493] team0 (unregistering): Port device team_slave_0 removed [ 1300.419726] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1300.476779] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1300.486747] net_ratelimit: 8 callbacks suppressed [ 1300.486756] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1300.490731] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1300.561170] bond0 (unregistering): Released all slaves [ 1300.613739] block nbd0: shutting down sockets 00:26:12 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0xffffff7f00000000]}, 0x10) 00:26:12 executing program 3: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x600000000000000, 0x100) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000080)={0x2, 0x16ac}) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f00000002c0)=[0xee00, 0xee01]) fchown(r1, r3, r4) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x2, 0x0, 0x100, &(0x7f0000000100)=[0x0, 0x0], 0x2}, 0x20) ioctl(r5, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000340)={'ip_vti0\x00', &(0x7f0000000300)=@ethtool_ts_info={0x41, 0x80000001, 0x9, 0x3, [0x4, 0x8, 0x5], 0x5, [0x1, 0xfe, 0x80]}}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000380)=0x80, 0x4) ioctl$NBD_SET_FLAGS(r2, 0xab0a, 0xff) r6 = msgget$private(0x0, 0x40) msgsnd(r6, &(0x7f0000000180)={0x3, "1cda6976de263b2297252b44e13c5fc9de7a7d49cca81d247835e3d4c33ca309e1bc3f1ba09dd7cfd46ce6fc052d9aada0d7f3287fa76abeccda6b80bfc3523850658c2485c41a12ff419d4ab94372d7ff5e3f"}, 0x5b, 0x800) 00:26:12 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x120643b6d0b, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:12 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xff00, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1300.917949] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1300.934131] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1300.957789] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1300.995196] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1301.020271] block nbd0: shutting down sockets [ 1301.362326] bridge0: port 1(bridge_slave_0) entered blocking state [ 1301.369049] bridge0: port 1(bridge_slave_0) entered disabled state [ 1301.376354] device bridge_slave_0 entered promiscuous mode [ 1301.400563] bridge0: port 2(bridge_slave_1) entered blocking state [ 1301.407294] bridge0: port 2(bridge_slave_1) entered disabled state [ 1301.415051] device bridge_slave_1 entered promiscuous mode [ 1301.450456] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1301.476199] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1301.561530] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1301.589621] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1301.695120] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1301.702224] team0: Port device team_slave_0 added [ 1301.727109] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1301.734474] team0: Port device team_slave_1 added [ 1301.757898] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1301.764750] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1301.773826] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1301.805856] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1301.813492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1301.823357] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1301.853618] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1301.860997] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1301.869261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1301.888114] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1301.895269] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1301.903083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1302.107588] bridge0: port 2(bridge_slave_1) entered blocking state [ 1302.114006] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1302.120576] bridge0: port 1(bridge_slave_0) entered blocking state [ 1302.126949] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1302.135180] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1302.764101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1302.851781] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1302.921123] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1302.989414] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1302.995583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1303.002460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1303.071378] 8021q: adding VLAN 0 to HW filter on device team0 00:26:14 executing program 0: 00:26:14 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x1100, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:14 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x12067e5b1bf, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:14 executing program 3: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x600000000000000, 0x100) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000080)={0x2, 0x16ac}) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f00000002c0)=[0xee00, 0xee01]) fchown(r1, r3, r4) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x2, 0x0, 0x100, &(0x7f0000000100)=[0x0, 0x0], 0x2}, 0x20) ioctl(r5, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000340)={'ip_vti0\x00', &(0x7f0000000300)=@ethtool_ts_info={0x41, 0x80000001, 0x9, 0x3, [0x4, 0x8, 0x5], 0x5, [0x1, 0xfe, 0x80]}}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000380)=0x80, 0x4) ioctl$NBD_SET_FLAGS(r2, 0xab0a, 0xff) msgget$private(0x0, 0x40) 00:26:14 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0x2000000]}, 0x10) 00:26:14 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x4000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1303.505116] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1303.519806] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 00:26:14 executing program 0: [ 1303.546755] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1303.550613] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1303.589672] block nbd0: shutting down sockets 00:26:14 executing program 3: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x600000000000000, 0x100) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000080)={0x2, 0x16ac}) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f00000002c0)=[0xee00, 0xee01]) fchown(r1, r3, r4) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x2, 0x0, 0x100, &(0x7f0000000100)=[0x0, 0x0], 0x2}, 0x20) ioctl(r5, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000340)={'ip_vti0\x00', &(0x7f0000000300)=@ethtool_ts_info={0x41, 0x80000001, 0x9, 0x3, [0x4, 0x8, 0x5], 0x5, [0x1, 0xfe, 0x80]}}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000380)=0x80, 0x4) ioctl$NBD_SET_FLAGS(r2, 0xab0a, 0xff) 00:26:14 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x900, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1303.692481] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1303.703150] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:26:14 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xfb74316520010000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1303.740892] block nbd0: shutting down sockets 00:26:15 executing program 3: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x600000000000000, 0x100) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000080)={0x2, 0x16ac}) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f00000002c0)=[0xee00, 0xee01]) fchown(r1, r3, r4) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x2, 0x0, 0x100, &(0x7f0000000100)=[0x0, 0x0], 0x2}, 0x20) ioctl(r5, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000340)={'ip_vti0\x00', &(0x7f0000000300)=@ethtool_ts_info={0x41, 0x80000001, 0x9, 0x3, [0x4, 0x8, 0x5], 0x5, [0x1, 0xfe, 0x80]}}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000380)=0x80, 0x4) [ 1303.811904] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:26:15 executing program 0: 00:26:15 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xf4010000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1303.917020] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1303.991656] block nbd0: shutting down sockets [ 1304.057784] IPVS: ftp: loaded support on port[0] = 21 [ 1304.244209] device bridge_slave_1 left promiscuous mode [ 1304.249984] bridge0: port 2(bridge_slave_1) entered disabled state 00:26:15 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x1100, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:15 executing program 3: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x600000000000000, 0x100) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000080)={0x2, 0x16ac}) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f00000002c0)=[0xee00, 0xee01]) fchown(r1, r3, r4) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x2, 0x0, 0x100, &(0x7f0000000100)=[0x0, 0x0], 0x2}, 0x20) ioctl(r5, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000340)={'ip_vti0\x00', &(0x7f0000000300)=@ethtool_ts_info={0x41, 0x80000001, 0x9, 0x3, [0x4, 0x8, 0x5], 0x5, [0x1, 0xfe, 0x80]}}) 00:26:15 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x983a000000000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:15 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x16000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:15 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0x1500]}, 0x10) [ 1304.284670] device bridge_slave_0 left promiscuous mode [ 1304.290171] bridge0: port 1(bridge_slave_0) entered disabled state [ 1304.391777] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1304.417306] team0 (unregistering): Port device team_slave_1 removed [ 1304.428585] team0 (unregistering): Port device team_slave_0 removed [ 1304.444985] bond0 (unregistering): Releasing backup interface bond_slave_1 00:26:15 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xe803, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1304.486764] bond0 (unregistering): Releasing backup interface bond_slave_0 00:26:15 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x11490f, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1304.557499] bond0 (unregistering): Released all slaves [ 1304.632224] block nbd0: shutting down sockets 00:26:15 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xa00000000000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:15 executing program 3: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x600000000000000, 0x100) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000080)={0x2, 0x16ac}) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f00000002c0)=[0xee00, 0xee01]) fchown(r1, r3, r4) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x2, 0x0, 0x100, &(0x7f0000000100)=[0x0, 0x0], 0x2}, 0x20) ioctl(r5, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000340)={'ip_vti0\x00', &(0x7f0000000300)=@ethtool_ts_info={0x41, 0x80000001, 0x9, 0x3, [0x4, 0x8, 0x5], 0x5, [0x1, 0xfe, 0x80]}}) 00:26:15 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x49d2dc44, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1304.765766] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1304.835563] block nbd0: shutting down sockets [ 1305.186598] bridge0: port 1(bridge_slave_0) entered blocking state [ 1305.193026] bridge0: port 1(bridge_slave_0) entered disabled state [ 1305.200619] device bridge_slave_0 entered promiscuous mode [ 1305.260940] bridge0: port 2(bridge_slave_1) entered blocking state [ 1305.267447] bridge0: port 2(bridge_slave_1) entered disabled state [ 1305.275215] device bridge_slave_1 entered promiscuous mode [ 1305.309634] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1305.336359] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1305.398193] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1305.434095] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1305.533721] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1305.540887] team0: Port device team_slave_0 added [ 1305.568627] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1305.575990] team0: Port device team_slave_1 added [ 1305.601224] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1305.624764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1305.648749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1305.672834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1305.866387] bridge0: port 2(bridge_slave_1) entered blocking state [ 1305.872772] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1305.879411] bridge0: port 1(bridge_slave_0) entered blocking state [ 1305.885805] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1305.892960] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1306.591686] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1306.660173] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1306.729360] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1306.735500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1306.742378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1306.803999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1306.815522] 8021q: adding VLAN 0 to HW filter on device team0 00:26:18 executing program 0: 00:26:18 executing program 3: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x600000000000000, 0x100) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000080)={0x2, 0x16ac}) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f00000002c0)=[0xee00, 0xee01]) fchown(r1, r3, r4) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x2, 0x0, 0x100, &(0x7f0000000100)=[0x0, 0x0], 0x2}, 0x20) ioctl(r5, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:26:18 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x3204000000000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:18 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x6, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:18 executing program 5: 00:26:18 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0x11]}, 0x10) 00:26:18 executing program 5: [ 1307.254277] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1307.280859] net_ratelimit: 7 callbacks suppressed [ 1307.280869] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:26:18 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x3563010000000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:18 executing program 0: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x50212, 0x2000e803, &(0x7f0000000000)={0x2, 0x4e23}, 0x10) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x3, 0x410000) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f0000000080)={0x3, 0x0, [{0xc000000f, 0x1, 0x3, 0x8, 0x3, 0x8, 0x5}, {0x7, 0x1, 0x7, 0x3, 0x0, 0x3d0, 0x3}, {0xc000000f, 0x80, 0x1, 0x8, 0x7, 0x7, 0x3}]}) [ 1307.297480] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1307.304725] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1307.344154] block nbd0: shutting down sockets 00:26:18 executing program 3: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x600000000000000, 0x100) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000080)={0x2, 0x16ac}) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f00000002c0)=[0xee00, 0xee01]) fchown(r1, r3, r4) socket$inet6(0xa, 0x1000000000002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x2, 0x0, 0x100, &(0x7f0000000100)=[0x0, 0x0], 0x2}, 0x20) [ 1307.465117] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] 00:26:18 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xfe80000000000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1307.505434] block nbd0: shutting down sockets 00:26:18 executing program 3: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x600000000000000, 0x100) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000080)={0x2, 0x16ac}) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f00000002c0)=[0xee00, 0xee01]) fchown(r1, r3, r4) socket$inet6(0xa, 0x1000000000002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x2, 0x0, 0x100, &(0x7f0000000100)=[0x0, 0x0], 0x2}, 0x20) 00:26:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x2, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="0fc75af38f49189b26440f00d6c441cb5cc00fc71bc442f932d10f225c0f01cb66baf80cb8a4d35b8bef66bafc0c66edb805000000b9020000000f01c1", 0x3d}], 0x1, 0x40, &(0x7f0000000280), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000400), &(0x7f0000000180), &(0x7f0000000000), &(0x7f0000000280)) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000040)) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81806) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1307.551641] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1307.610198] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1307.661261] block nbd0: shutting down sockets [ 1307.684376] IPVS: ftp: loaded support on port[0] = 21 00:26:18 executing program 3: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x600000000000000, 0x100) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000080)={0x2, 0x16ac}) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f00000002c0)=[0xee00, 0xee01]) fchown(r1, r3, r4) socket$inet6(0xa, 0x1000000000002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x2, 0x0, 0x100, &(0x7f0000000100)=[0x0, 0x0], 0x2}, 0x20) 00:26:18 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x4002000000000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1307.787444] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1307.787990] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1307.833347] block nbd0: shutting down sockets [ 1307.954154] device bridge_slave_1 left promiscuous mode [ 1307.960060] bridge0: port 2(bridge_slave_1) entered disabled state [ 1308.004829] device bridge_slave_0 left promiscuous mode [ 1308.012169] bridge0: port 1(bridge_slave_0) entered disabled state [ 1308.070199] team0 (unregistering): Port device team_slave_1 removed [ 1308.082150] team0 (unregistering): Port device team_slave_0 removed [ 1308.092118] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1308.116854] bond0 (unregistering): Releasing backup interface bond_slave_0 00:26:19 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xff00000000000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:19 executing program 3: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x600000000000000, 0x100) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000080)={0x2, 0x16ac}) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f00000002c0)=[0xee00, 0xee01]) fchown(r1, r3, r4) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r5, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:26:19 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x200000000000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:19 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0x900000000000000]}, 0x10) 00:26:19 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x3563010000000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1308.192008] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1308.213273] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1308.218332] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1308.274205] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1308.293340] bond0 (unregistering): Released all slaves 00:26:19 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x5000000000000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1308.371841] block nbd0: shutting down sockets [ 1308.399560] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:26:19 executing program 3: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x600000000000000, 0x100) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000080)={0x2, 0x16ac}) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f00000002c0)=[0xee00, 0xee01]) fchown(r1, r3, r4) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r5, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:26:19 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xe60100, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:19 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x9000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1308.511986] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1308.529605] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1308.595990] block nbd0: shutting down sockets [ 1309.070499] bridge0: port 1(bridge_slave_0) entered blocking state [ 1309.077074] bridge0: port 1(bridge_slave_0) entered disabled state [ 1309.084860] device bridge_slave_0 entered promiscuous mode [ 1309.138800] bridge0: port 2(bridge_slave_1) entered blocking state [ 1309.150478] bridge0: port 2(bridge_slave_1) entered disabled state [ 1309.157608] device bridge_slave_1 entered promiscuous mode [ 1309.192491] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1309.216675] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1309.292350] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1309.323306] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1309.433747] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1309.441097] team0: Port device team_slave_0 added [ 1309.462321] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1309.469379] team0: Port device team_slave_1 added [ 1309.490572] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1309.513408] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1309.537487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1309.560738] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1309.755517] bridge0: port 2(bridge_slave_1) entered blocking state [ 1309.761879] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1309.768519] bridge0: port 1(bridge_slave_0) entered blocking state [ 1309.774873] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1310.475782] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1310.546426] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1310.615145] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1310.621267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1310.628690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1310.700168] 8021q: adding VLAN 0 to HW filter on device team0 00:26:22 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x5000000000000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:22 executing program 3: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x600000000000000, 0x100) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000080)={0x2, 0x16ac}) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f00000002c0)=[0xee00, 0xee01]) fchown(r1, r3, r4) ioctl(0xffffffffffffffff, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:26:22 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xa000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:22 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x100000000000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:22 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0xfcff000000000000]}, 0x10) 00:26:22 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x3563010000000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:22 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x5000000000000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1311.170235] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1311.216943] block nbd0: shutting down sockets 00:26:22 executing program 3: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x600000000000000, 0x100) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000080)={0x2, 0x16ac}) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f00000002c0)=[0xee00, 0xee01]) fchown(r1, r3, r4) ioctl(0xffffffffffffffff, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:26:22 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xf4010000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:22 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xfec0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:22 executing program 3: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x600000000000000, 0x100) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000080)={0x2, 0x16ac}) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f00000002c0)=[0xee00, 0xee01]) fchown(r1, r3, r4) ioctl(0xffffffffffffffff, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") [ 1311.301967] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1311.336567] block nbd0: shutting down sockets 00:26:22 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x5000000000000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:22 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x5400000000000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:22 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x40000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1311.427434] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1311.496810] block nbd0: shutting down sockets 00:26:22 executing program 3: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x600000000000000, 0x100) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000080)={0x2, 0x16ac}) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgroups(0x2, &(0x7f00000002c0)=[0xee00, 0xee01]) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") [ 1311.548288] IPVS: ftp: loaded support on port[0] = 21 00:26:22 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xa000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1311.641062] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1311.731962] block nbd0: shutting down sockets [ 1311.784525] device bridge_slave_1 left promiscuous mode [ 1311.796490] bridge0: port 2(bridge_slave_1) entered disabled state [ 1311.844762] device bridge_slave_0 left promiscuous mode [ 1311.850306] bridge0: port 1(bridge_slave_0) entered disabled state 00:26:23 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0xff000000]}, 0x10) 00:26:23 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xfec0000000000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:23 executing program 3: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x600000000000000, 0x100) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000080)={0x2, 0x16ac}) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:26:23 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x432, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:23 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xa000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1311.908374] team0 (unregistering): Port device team_slave_1 removed [ 1311.918164] team0 (unregistering): Port device team_slave_0 removed [ 1311.929762] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1311.987979] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1312.003398] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1312.050174] bond0 (unregistering): Released all slaves 00:26:23 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x1000000000000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1312.120064] block nbd0: shutting down sockets 00:26:23 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xf38a0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1312.785465] bridge0: port 1(bridge_slave_0) entered blocking state [ 1312.791912] bridge0: port 1(bridge_slave_0) entered disabled state [ 1312.802474] device bridge_slave_0 entered promiscuous mode [ 1312.858217] bridge0: port 2(bridge_slave_1) entered blocking state [ 1312.864945] bridge0: port 2(bridge_slave_1) entered disabled state [ 1312.872145] device bridge_slave_1 entered promiscuous mode [ 1312.894472] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1312.916876] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1312.995021] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1313.019581] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1313.113324] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1313.120698] team0: Port device team_slave_0 added [ 1313.142514] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1313.149645] team0: Port device team_slave_1 added [ 1313.171352] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1313.194303] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1313.218716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1313.242450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1313.443050] bridge0: port 2(bridge_slave_1) entered blocking state [ 1313.449482] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1313.456157] bridge0: port 1(bridge_slave_0) entered blocking state [ 1313.462492] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1313.469656] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1314.171343] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1314.241543] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1314.310308] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1314.316470] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1314.323415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1314.394618] 8021q: adding VLAN 0 to HW filter on device team0 [ 1314.400667] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 00:26:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x805, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000240)="ff02040000eeff0000000000000000000000000000020205", 0x10) sendto$inet6(r0, &(0x7f00000000c0)='E', 0x1, 0x3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x8dffffff]}, 0x9}, 0x1c) r1 = timerfd_create(0x0, 0x80803) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) fsetxattr$security_selinux(r1, &(0x7f0000000180)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:mouse_device_t:s0\x00', 0x24, 0x3) timerfd_settime(r1, 0x1, &(0x7f0000000100)={{r2, r3+30000000}, {0x0, 0x1c9c380}}, &(0x7f0000000140)) 00:26:25 executing program 3: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x600000000000000, 0x100) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000080)={0x2, 0x16ac}) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:26:25 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x24270000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:25 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xe0280700, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:25 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xa000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:25 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0x900]}, 0x10) [ 1314.847760] net_ratelimit: 13 callbacks suppressed [ 1314.847778] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1314.863829] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1314.883960] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:26:26 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000980)={0x8, "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", 0x1000}, 0x1006) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000000c0), 0x8080fffffffe) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000140), &(0x7f0000000180)=0x14) tgkill(r2, 0x0, 0x5) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000100)=0x6) [ 1314.884509] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1314.918762] block nbd0: shutting down sockets 00:26:26 executing program 3: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x600000000000000, 0x100) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000080)={0x2, 0x16ac}) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:26:26 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x7562a24, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1315.053046] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] 00:26:26 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x103080, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1315.099974] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1315.105162] block nbd0: shutting down sockets 00:26:26 executing program 3: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x600000000000000, 0x100) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000080)={0x2, 0x16ac}) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:26:26 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xcf001080, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1315.180617] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1315.211844] block nbd0: shutting down sockets 00:26:26 executing program 0: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0x12) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) rt_sigqueueinfo(r1, 0xb, &(0x7f0000000200)={0x0, 0x5, 0x4, 0x800}) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f00000004c0)={0x84000}) getsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000240)={@empty, @broadcast}, &(0x7f0000000280)=0x8) syz_kvm_setup_cpu$x86(r0, r0, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@text16={0x10, &(0x7f00000000c0)="6bd7d60f229e360f0139baf80c66b8b0ce1e8b66efbafc0ced360f019b0d00673e266764805a04f2440f20c066350a000000440f22c03e0f756b002e0f01cf0fc76d16", 0x43}], 0x1, 0x1c, &(0x7f0000000140)=[@cr0={0x0, 0x4}, @flags={0x3, 0x20300}], 0x2) creat(&(0x7f0000000080)='./file0\x00', 0x0) 00:26:26 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xe8030000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:26 executing program 3: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x600000000000000, 0x100) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000080)={0x2, 0x16ac}) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:26:26 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1315.348337] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1315.349023] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1315.414795] IPVS: ftp: loaded support on port[0] = 21 [ 1315.421902] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1315.438382] block nbd0: shutting down sockets 00:26:26 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xa000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1315.624205] device bridge_slave_1 left promiscuous mode [ 1315.629749] bridge0: port 2(bridge_slave_1) entered disabled state 00:26:26 executing program 3: socket(0x11, 0x2, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x600000000000000, 0x100) ioctl$KVM_IRQ_LINE_STATUS(r0, 0xc008ae67, &(0x7f0000000080)={0x2, 0x16ac}) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:26:26 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x2427, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:26 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x999463da61, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:26 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0x1000000000000000]}, 0x10) [ 1315.669425] device bridge_slave_0 left promiscuous mode [ 1315.695917] bridge0: port 1(bridge_slave_0) entered disabled state [ 1315.706822] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1315.719193] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1315.729487] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] 00:26:26 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x40020000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1315.772524] team0 (unregistering): Port device team_slave_1 removed [ 1315.791413] team0 (unregistering): Port device team_slave_0 removed [ 1315.806050] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1315.837859] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1315.851350] bond0 (unregistering): Releasing backup interface bond_slave_0 00:26:27 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x4c1d, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1315.907752] bond0 (unregistering): Released all slaves [ 1315.952350] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:26:27 executing program 3: socket(0x11, 0x2, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x600000000000000, 0x100) ioctl$KVM_IRQ_LINE_STATUS(r0, 0xc008ae67, &(0x7f0000000080)={0x2, 0x16ac}) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") [ 1316.069276] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1316.572784] bridge0: port 1(bridge_slave_0) entered blocking state [ 1316.579341] bridge0: port 1(bridge_slave_0) entered disabled state [ 1316.586389] device bridge_slave_0 entered promiscuous mode [ 1316.611520] bridge0: port 2(bridge_slave_1) entered blocking state [ 1316.617904] bridge0: port 2(bridge_slave_1) entered disabled state [ 1316.624975] device bridge_slave_1 entered promiscuous mode [ 1316.659516] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1316.687477] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1316.753134] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1316.787675] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1316.882952] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1316.890087] team0: Port device team_slave_0 added [ 1316.911498] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1316.918624] team0: Port device team_slave_1 added [ 1316.939877] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1316.963505] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1316.987868] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1317.011300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1317.207031] bridge0: port 2(bridge_slave_1) entered blocking state [ 1317.213385] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1317.220034] bridge0: port 1(bridge_slave_0) entered blocking state [ 1317.226669] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1317.941685] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1318.011054] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1318.079619] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1318.085780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1318.092661] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1318.163165] 8021q: adding VLAN 0 to HW filter on device team0 00:26:29 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vhci\x00', 0x2000, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30e) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) r1 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0xffffffffffffffff, 0x70, 0x0, 0x0, 0x9, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f00000001c0)={0x0, 0x3}) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffbfffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r2, 0x0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000180)) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x400000000, &(0x7f0000000400)={&(0x7f00000003c0)=""/45, 0x2d}) writev(r3, &(0x7f0000000080), 0x1a6) 00:26:29 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x1600, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:29 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x12066d6c9f9, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:29 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0x4c00000000000000]}, 0x10) 00:26:29 executing program 3: socket(0x11, 0x2, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x600000000000000, 0x100) ioctl$KVM_IRQ_LINE_STATUS(r0, 0xc008ae67, &(0x7f0000000080)={0x2, 0x16ac}) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:26:29 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x365, &(0x7f0000000040), 0x0, &(0x7f0000000440)=ANY=[@ANYPTR64]) 00:26:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b7020000ff000000bfa30000000000000702000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x8100, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0xd7, &(0x7f0000000600)="1613204aec0c3c1d40ff00e10043", &(0x7f0000000380)=""/215}, 0x28) [ 1318.630021] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] 00:26:29 executing program 5: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = dup3(r0, r1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000000240)=0xe8) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000280)=0x2fe, 0x4) llistxattr(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)=""/16, 0x10) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="010000000000000000"], &(0x7f0000000180)='./file0/file1/file0\x00', &(0x7f00000001c0)='sysfs\x00', 0x3000, &(0x7f0000000200)='keyring*\x00') setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x5) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local, [0x0, 0x2]}, 0x10) shutdown(r1, 0x1) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 00:26:29 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x29d59e6620010000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:29 executing program 3: socket(0x11, 0x2, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x600000000000000, 0x100) ioctl$KVM_IRQ_LINE_STATUS(r0, 0xc008ae67, &(0x7f0000000080)={0x2, 0x16ac}) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:26:29 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x1802, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:30 executing program 5: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = dup3(r0, r1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@broadcast, @in=@broadcast}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000000240)=0xe8) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000280)=0x2fe, 0x4) llistxattr(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)=""/16, 0x10) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="010000000000000000"], &(0x7f0000000180)='./file0/file1/file0\x00', &(0x7f00000001c0)='sysfs\x00', 0x3000, &(0x7f0000000200)='keyring*\x00') setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x5) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local, [0x0, 0x2]}, 0x10) shutdown(r1, 0x1) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) [ 1318.806108] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] 00:26:30 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket(0xa, 0x803, 0x7) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) ptrace$peek(0x2, r2, &(0x7f0000000040)) ioctl$sock_bt(r1, 0x8906, &(0x7f0000000000)) setxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@v2={0x3, 0x0, 0x0, 0x7ff, 0x8d, "96481c3d6e706a987621b85172a0cf17fc386cd3eaa194558177642b540289d60238580d7cac84147f7acd55a95837660e82084b6f10e1f99a104263a39a3c5de15c8ed9869c0ee4e2c4615839bd15f851841eddc8c109e62d7bd818da2dceaf1305a20488e4f7e5cfb46d52e5489baf0a147201027c47e27de54149828a27d53394a2a80f43153dba9e51c32f"}, 0x97, 0x1) sendmmsg$inet_sctp(r1, &(0x7f0000871fc8)=[{&(0x7f000086c000)=@in6, 0x1c, &(0x7f0000d1e000), 0x0, &(0x7f0000dda000), 0x357, 0x200480c5}], 0x1, 0x0) recvfrom(r1, &(0x7f00000002c0)=""/4096, 0xfffffffffffffdaa, 0x0, &(0x7f0000005d80)=@un=@abs, 0x70c000) 00:26:30 executing program 3: socket(0x11, 0x2, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x600000000000000, 0x100) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:26:30 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x700000000000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1318.984809] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1319.065358] IPVS: ftp: loaded support on port[0] = 21 [ 1319.174589] device bridge_slave_1 left promiscuous mode [ 1319.180060] bridge0: port 2(bridge_slave_1) entered disabled state [ 1319.234553] device bridge_slave_0 left promiscuous mode [ 1319.240040] bridge0: port 1(bridge_slave_0) entered disabled state [ 1319.297851] team0 (unregistering): Port device team_slave_1 removed [ 1319.306765] team0 (unregistering): Port device team_slave_0 removed [ 1319.316673] bond0 (unregistering): Releasing backup interface bond_slave_1 00:26:30 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0x60000000]}, 0x10) 00:26:30 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x500000000000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:30 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000400)={{}, "73797a300000ffffffff0000000000004000"}) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000080)={{}, 'syz1\x00', 0x3a}) syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x5, 0x1) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) r2 = dup3(r0, r1, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000140)=0x8) 00:26:30 executing program 3: socket(0x11, 0x2, 0x0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:26:30 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xd50000000000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1319.366517] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1319.445887] input: syz0 as /devices/virtual/input/input30 [ 1319.473721] bond0 (unregistering): Released all slaves [ 1319.500083] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] 00:26:30 executing program 3: socket(0x11, 0x2, 0x0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") [ 1319.545816] input: syz0 as /devices/virtual/input/input31 00:26:30 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x4, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:30 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000040)='veth1_to_bond\x00') r2 = openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r4, r1, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="c744240006000000c744240200000080c7442406000000000f01142466b8c2008ec80f070f0f369a0f2002674669f9c12c000026660f38157e0f660f0dbead00000066baf80cb8bcecb281ef66bafc0cb80b000000ef0f20d835080000000f22d8", 0x61}], 0x1, 0x0, &(0x7f0000000180), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000027000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, &(0x7f0000000240)="0f21abd9f6b8fc0d8ec03e0cfcd8fa2e3e0f00d9baf80c66b89c39008866efbafc0c66b80a5e000066efbaf80c66b884929d8f66efbafc0c66b8e100000066eff2f30f19809988260f06", 0x4a}], 0xaaaaaaaaaaaab18, 0x0, &(0x7f00000001c0), 0x226) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='.\x00', 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000100)) r6 = openat$cgroup_ro(r0, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) r7 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$EVIOCGPROP(r7, 0x80404509, &(0x7f0000000140)=""/158) sendfile(r2, r6, &(0x7f0000000380), 0x6) 00:26:30 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x91ffffff00000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1319.690749] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1319.778004] QAT: Invalid ioctl [ 1319.805514] QAT: Invalid ioctl [ 1320.233354] bridge0: port 1(bridge_slave_0) entered blocking state [ 1320.240051] bridge0: port 1(bridge_slave_0) entered disabled state [ 1320.247824] device bridge_slave_0 entered promiscuous mode [ 1320.281639] bridge0: port 2(bridge_slave_1) entered blocking state [ 1320.288051] bridge0: port 2(bridge_slave_1) entered disabled state [ 1320.295078] device bridge_slave_1 entered promiscuous mode [ 1320.318309] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1320.341252] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1320.422767] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1320.459367] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1320.553491] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1320.560625] team0: Port device team_slave_0 added [ 1320.581856] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1320.588983] team0: Port device team_slave_1 added [ 1320.610764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1320.633579] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1320.658424] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1320.681969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1320.874083] bridge0: port 2(bridge_slave_1) entered blocking state [ 1320.880440] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1320.887086] bridge0: port 1(bridge_slave_0) entered blocking state [ 1320.893422] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1320.900931] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1321.613459] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1321.684209] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1321.755412] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1321.761554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1321.769043] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1321.776194] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1321.840430] 8021q: adding VLAN 0 to HW filter on device team0 00:26:33 executing program 0: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x30004}, 0x0, 0xffffffffffffffff, r0, 0xa) r2 = socket$netlink(0x10, 0x3, 0xa) writev(r2, &(0x7f0000000100)=[{&(0x7f0000000240)="480000001400197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0fe5f0028213ee20600d4ff5bffff00c7e5ed5e00000000c8550000000000000000", 0x48}], 0x1) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000080)) 00:26:33 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:26:33 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x844a426620010000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:33 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xe8030000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:33 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) r1 = socket(0x200000000000011, 0x3, 0x8) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f00000003c0)={0x11, 0x0, r2}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)={r0}) sendto(r1, &(0x7f0000000180)="95275dc687a7ff0c11f9586245463853844942a1feb7a20000000000000000000000ff2d79292fc31e7d033dfe500b3045a5dbcc5989b017baa01f72f53438e39fd1782aa90d1172a591b481253006178c516fcb9564d7b7160992a3efdb73b21fe0294568d1dd0505ac8ac10b0d5a410e058bd13b026792aca9c42fc8825ea28f6d61835b9d0205b21dfe3fb3c4e39432c05c1a65286001a40b429851e4be46b7e445d5a024452524", 0xffffffffffffff56, 0x20004080, 0x0, 0x0) 00:26:33 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0x4000000000000000]}, 0x10) [ 1322.273431] net_ratelimit: 10 callbacks suppressed [ 1322.273442] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1322.290968] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 00:26:33 executing program 0: clock_nanosleep(0xfffffbfffffffff4, 0x0, &(0x7f0000000000), 0x0) [ 1322.316395] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1322.322857] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:26:33 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:26:33 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x8dffffff00000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:33 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x40000, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @local}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_int(r0, 0x29, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000040), 0x4) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000280)=[0x9]) setsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000100)="ccbe8ac3a9fce50f831917d51f150581d61b65cb64f8f7b7a8f95adeac249c01adbd7d82a5fca544b0435c28d44713e070571f6a468238854dabc5df6a1e05110effb1b6ac123a835408a76e620505d693e48b7fc2f298332f68", 0x5a) r1 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f00000001c0)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x140202, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f000000afee)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r3, r2) io_submit(0x0, 0x0, &(0x7f0000000100)) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x1000, 0x4) ftruncate(0xffffffffffffffff, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) [ 1322.490438] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:26:33 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x92130000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:33 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x40000, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @local}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_int(r0, 0x29, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000040), 0x4) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000280)=[0x9]) setsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000100)="ccbe8ac3a9fce50f831917d51f150581d61b65cb64f8f7b7a8f95adeac249c01adbd7d82a5fca544b0435c28d44713e070571f6a468238854dabc5df6a1e05110effb1b6ac123a835408a76e620505d693e48b7fc2f298332f68", 0x5a) r1 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f00000001c0)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x140202, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f000000afee)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r3, r2) io_submit(0x0, 0x0, &(0x7f0000000100)) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x1000, 0x4) ftruncate(0xffffffffffffffff, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) [ 1322.588970] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1322.600606] XFS (loop3): Invalid superblock magic number 00:26:33 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:26:33 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x8e00, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:34 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x18, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000080)=0x1) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x2, 0x32, 0xffffffffffffffff, 0x0) close(r0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x4, 0x5}) [ 1322.810889] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:26:34 executing program 0: mount(&(0x7f0000000480), &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) semget$private(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001d80)={'gre0\x00', 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000200)={0x598d, 0x0, 0x0, 'queue0\x00'}) r3 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x2, 0x0) ioctl$BLKROSET(r3, 0x125d, &(0x7f00000002c0)=0x6) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r2}, 0x58) clock_gettime(0x0, &(0x7f0000002900)={0x0, 0x0}) recvmmsg(r0, &(0x7f00000027c0), 0x40004c3, 0x1ba, &(0x7f0000002940)={0x0, r4+10000000}) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000840)={{{@in6=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000000940)=0xe8) fstat(r1, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000780)=[{&(0x7f0000000340)="ab74e71ef3bc861d5e46a3cc3b30f4d4a7f3516fc40f3d23bc4ba017df5557e243b7c7a1fcfcda2c15cb3f41dd133d784d", 0x31, 0x800000}, {&(0x7f0000000380)="52cb8907fde2f5a67df70e3020dbefc1a02a51b7a807c57355b94b03561a0c172e61fa3396e355eaadba2ea8b2cd9d34e712cbcbe91a8e158f643d316e5700afbf90d75a5f7088111228844cd155e0960d00dbfe69da0fa549e43e88eb3b3b994f5a2898a87cd14fd26f0676ae3a4751d43a9b54c00679a24ab2cbaf3f5abef4bfa3cb2c0e4f2be7cf643e7a6ecae33baecc20d23a7cf132e29c235cbefa0566e882136c783c711a7a078d6890a0635c9e51b44fa0fa9cd0b491024f6513afa464627683bd483951cfea8d1db8381f79c7830268e976107d3fbb22bbd1b1405691734552fff7ecc7c96a062e5bdf71ed", 0xf0, 0xff}, {&(0x7f0000000480)="74a835e5dcdc8054973c0ae3a316498179", 0x11, 0x3}, {&(0x7f00000004c0)="2fe0d056cbe6833cc6144b9e91458737", 0x10, 0x5}, {&(0x7f0000000500)="6f8e251fedf8af6198a6c62588986d2cede5123b245f51b2b462e020744251f524116c89a07e39f94ad0d23afefaade6f26fb65ed36d64c578d261333726f007f6ce021c51ac4521c7cb334172d64a8062d7120bff93312c2188a8ed3a08a228ac5f25cdb2bca1a171a5e514af9876001a6407e789b2e021f64c1de40279556b3c6bb401685ac7e2eca697e74388eaf0869350893a025eba62633748f465391c210c5e31eec394cb870ddf454a0998a63cff009c74407d81d11c8baf26009f556126f50770d4167904173119e2f56155b2054ac6505b73195f436bdd", 0xdc, 0x100}, {&(0x7f0000000600)="0acf8d9dc3331d96d33db4bbc3f86a2682b4c47bd74a83020140cea130829a69fdd8e95373f3d677d13b284c339d6342aa434f7978fb1e07cb5034cde9e2ec673a2a91f491761e99c202545f6e5881e4126f8bc4d4d7d01df3a02bde009fd739c22f05efca890a3afc9945", 0x6b}, {&(0x7f0000000680)="7483c1ffca25c7c1f73b9080c5d99dc7183fed549207c81e328cea909325b26c61314900448537a988289fb1d93d6a48ed21d14b87be111e9f4f7bf49f3da4f4173d143e3f6315d7bd5f8c09ffc4815333f4fdb7f74f6d0784cfecbb9e8cacb7546f5339ee9475f0680b7b7a6f67577c2b4ef1efc62c183282f18483b302753afffc1784a9555310db5d406ddb66b4b7126a14930cd83555a441b1c6348f1aae34ef1347f065d0240c9e49e0b1a345fc7c477e3f34fa127e7f8ac4ec544caa53695c99", 0xc3, 0xfffffffffffffffd}], 0x97f7eb6297631210, &(0x7f0000000a00)=ANY=[@ANYBLOB="626172726965722c626172726965722c63726561746f723d61a9761f2c73657373696f6e3d3078303030303030303030303030303030312c6673636f6e746578743d73746166665f752c66736e616d653d2f776c616e303a2c666f776e65723c", @ANYRESDEC=r5, @ANYBLOB=',smackfsdef=nodevwla\x00\x00\x00\x00ser*lo+,dont_appraise,pcr=00000000000000000041,euid<', @ANYRESDEC=r6, @ANYBLOB=',\x00']) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c5f720000000000000000000000000000090000000000000000000000004000000000003abf4ff0a8612ba4000000000000000038000000000000000000000000000000eeff000000000000000000000000000000000000000ef400000001000000000000000000000000000000000000000000dc00"], 0x78) 00:26:34 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xcaff1a6820010000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1323.005544] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1323.042763] XFS (loop3): Invalid superblock magic number [ 1323.044933] IPVS: ftp: loaded support on port[0] = 21 00:26:34 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0xfe80000000000000]}, 0x10) 00:26:34 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x47000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1323.064814] device bridge_slave_1 left promiscuous mode [ 1323.070330] bridge0: port 2(bridge_slave_1) entered disabled state 00:26:34 executing program 5: syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x8003, 0x1fe) epoll_pwait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x8001, &(0x7f00000000c0)={0xfffffffffffff1d8}, 0x8) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000bc0)={0x0}, &(0x7f0000000c00)=0xc) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f0000000080)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x0, r1}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x26) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, @loopback, 0x3}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f00000002c0)=0x1) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000280)={@loopback}) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) 00:26:34 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") [ 1323.135298] device bridge_slave_0 left promiscuous mode [ 1323.145260] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 00:26:34 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xff000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1323.194428] bridge0: port 1(bridge_slave_0) entered disabled state [ 1323.202685] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1323.285561] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1323.311958] team0 (unregistering): Port device team_slave_1 removed [ 1323.323459] team0 (unregistering): Port device team_slave_0 removed [ 1323.332258] XFS (loop3): Invalid superblock magic number [ 1323.345572] bond0 (unregistering): Releasing backup interface bond_slave_1 00:26:34 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x1000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:34 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x120653174fb, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1323.398606] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1323.462898] bond0 (unregistering): Released all slaves 00:26:34 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000600)={0x2, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='\fI'], 0x0, 0x0, &(0x7f0000000500)}) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f00000000c0), &(0x7f0000000100), 0x8) r2 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000001c0)={0x4c, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="11634840000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", @ANYPTR=&(0x7f00000000c0)=ANY=[], @ANYPTR=&(0x7f0000000100)=ANY=[], @ANYBLOB="0000001b55000000b5104e"], 0x97, 0x0, &(0x7f0000fedffe)}) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x8000, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000000340)=""/172) 00:26:34 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:26:34 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xffffff8d, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1323.613668] binder: 740:742 unknown command 18700 [ 1323.621005] XFS (loop3): invalid logbufsize: 68 [not 16k,32k,64k,128k or 256k] [ 1323.629254] binder: 740:742 ioctl c0306201 20000600 returned -22 [ 1323.637746] binder_alloc: 740: binder_alloc_buf size 365525204992 failed, no address space [ 1323.654126] binder_alloc: allocated: 0 (num: 0 largest: 0), free: 12288 (num: 1 largest: 12288) [ 1323.664303] binder: 740:742 transaction failed 29201/-28, size 0-0 line 2970 [ 1323.704788] binder: 740:750 unknown command 18700 [ 1323.728675] binder: 740:750 ioctl c0306201 20000600 returned -22 [ 1323.750972] binder: BINDER_SET_CONTEXT_MGR already set [ 1323.794543] binder: 740:742 ioctl 40046207 0 returned -16 [ 1323.824061] binder_alloc: 740: binder_alloc_buf, no vma [ 1323.834129] binder: 740:758 transaction failed 29189/-3, size 0-0 line 2970 [ 1324.398314] bridge0: port 1(bridge_slave_0) entered blocking state [ 1324.404850] bridge0: port 1(bridge_slave_0) entered disabled state [ 1324.411684] device bridge_slave_0 entered promiscuous mode [ 1324.445253] bridge0: port 2(bridge_slave_1) entered blocking state [ 1324.451674] bridge0: port 2(bridge_slave_1) entered disabled state [ 1324.458876] device bridge_slave_1 entered promiscuous mode [ 1324.482722] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1324.506848] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1324.570728] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1324.596352] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1324.695706] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1324.702802] team0: Port device team_slave_0 added [ 1324.724993] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1324.732048] team0: Port device team_slave_1 added [ 1324.755338] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1324.780440] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1324.804241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1324.828644] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1324.835919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1324.843680] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1325.048658] bridge0: port 2(bridge_slave_1) entered blocking state [ 1325.055068] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1325.061696] bridge0: port 1(bridge_slave_0) entered blocking state [ 1325.068081] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1325.075674] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1325.792748] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1325.862967] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1325.884041] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1325.940312] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1325.946479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1325.953372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1326.025467] 8021q: adding VLAN 0 to HW filter on device team0 00:26:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x280001, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000100), 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000240)=ANY=[]}, 0x0) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x400000000000) 00:26:37 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x16335, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:37 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:26:37 executing program 5: syz_read_part_table(0x7, 0x2, &(0x7f0000000180)=[{&(0x7f00000000c0)="9e3c929734abff", 0x7, 0x7}, {&(0x7f0000000300)="747d30998562964c3bb200d8713a08662c16631b1592e4b218249f10cb3b5b630ae7b417c1d37f9511ad27a62c6254ff4d115b3d67d87a7742158ef4b02b5b723d4ca3347e095656c590edd81532114a330103223f71e5399b422e4514aba95fd57d3c", 0x63, 0xff}]) r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000000)='./file1\x00', r0}, 0x10) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000040)={0x5f9, 0x0, 0x1, 0x100000000}) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f0000000080)={0x1000, r1}) ioctl$TIOCCBRK(r0, 0x5428) ioctl$FS_IOC_FSGETXATTR(r0, 0x8004550f, &(0x7f00000001c0)={0x0, 0xfffffffffffffffe}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x200, 0x3, 0x0, 0x0, 0x20, 0x9, "364d3ff3a4f28618e6bcf16917d34893532d8ea58d526790e267aacacd31b0e576af405bbad017c93e7d6c71bcab34f6ec484187407582ba79672e3d52ae6c29", "c8f5a63319f1da08a75525f2dc7f2ded422b18afb1c25c2c15bde5aca13f0f1f13f72451f32df973a7d04fc512272fda0f567d0dfeaefd1becd483324abe4d14", "a539d3b902c4b55af704207a8ebafe9123ef0bea74c0feef78ee061084284b57", [0x28f1, 0x3]}) 00:26:37 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x50, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:37 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0x6c00000000000000]}, 0x10) 00:26:37 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000000)='H', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0xa0400) write$UHID_INPUT2(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="0c0000004d0096899f875580d5df877575f7709c7a366cf3692b58f4b00f12d1d62a0c1737130f0eeb5111dbf379ef918183eb6890f2c426c03e291a67c8f1a01f60982b802769f5b84e5b4e4ff8a072bf6509ba48092133bd8b912c9b88d71d024a9929d32edf9300c4d684ea07416f43370d021527055ee7f1bf205a3b945441c86034656963c588f3940216e1c1d0982b61a2f856fdec1ffdab5bad687f73f6"], 0x53) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000240)={0x0, 0x16, "4f5705f667bad89ba7e4dcee2dfb4c219c046aa79cf8"}, &(0x7f0000000280)=0x1e) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000003c0)={0xfffffffffffffff9, 0xffffffff, 0x8, 0xa592, 0x0, 0x400, 0x49d7, 0x10000, r2}, 0x20) r3 = openat(r1, &(0x7f00000002c0)='./file0\x00', 0x200000, 0x21) ioctl$UI_SET_KEYBIT(r3, 0x40045565, 0x108) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000040)={{0x2, 0x4e24}, {0x6, @random="ce6e22ddfbc8"}, 0x1, {0x2, 0x4e20, @broadcast}, 'teql0\x00'}) shutdown(r0, 0x1) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x2}, 0x8) r4 = dup2(r0, r0) ioctl$RTC_EPOCH_SET(r4, 0x4008700e, 0xffffffffffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x16400, &(0x7f0000000180)="153f6234488dd25d766070ac299187147259498126deda6c0caaae2b8d0a9010cd80a7b8da8ae7f1134489a5abe3888d0c40471fff080ad7ef3607bee056ee80aed9bf") write$cgroup_type(r4, &(0x7f0000000100)='threaded\x00', 0x997f16c26276f838) accept$packet(r1, 0x0, &(0x7f0000000400)) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f0000000440)={0x7, 0x9}) 00:26:37 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x432, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:37 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") [ 1326.513150] XFS (loop3): invalid logbufsize: 68 [not 16k,32k,64k,128k or 256k] 00:26:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000), 0xc) [ 1326.603370] XFS (loop3): invalid logbufsize: 68 [not 16k,32k,64k,128k or 256k] 00:26:37 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x0]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:26:37 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x3, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:37 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x9, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1326.785501] XFS (loop3): invalid logbufsize: 68 [not 16k,32k,64k,128k or 256k] 00:26:38 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x0]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:26:38 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xe, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:38 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xfc00000000000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:38 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, &(0x7f0000000000)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000700)={r1, 0x4, 0x0, "6e036d4cf8aa85cc47acce0fad24264bd54271180bfa"}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000700)=ANY=[]) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000040)={0x3, 0x2}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000006c0)=0x1) [ 1327.000832] XFS (loop3): invalid logbufsize: 68 [not 16k,32k,64k,128k or 256k] [ 1327.262074] IPVS: ftp: loaded support on port[0] = 21 00:26:38 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0xfe800000]}, 0x10) [ 1327.296549] device bridge_slave_1 left promiscuous mode [ 1327.302084] bridge0: port 2(bridge_slave_1) entered disabled state [ 1327.343763] net_ratelimit: 7 callbacks suppressed [ 1327.343783] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1327.415287] device bridge_slave_0 left promiscuous mode [ 1327.420819] bridge0: port 1(bridge_slave_0) entered disabled state [ 1327.520265] team0 (unregistering): Port device team_slave_1 removed [ 1327.529221] team0 (unregistering): Port device team_slave_0 removed [ 1327.538724] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1327.577131] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1327.626931] bond0 (unregistering): Released all slaves 00:26:38 executing program 5: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000680)) getpgid(0xffffffffffffffff) getpgrp(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000740)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000700)="6e6574829e6301000800") r2 = getpid() capset(&(0x7f00000003c0)={0x20080522, r2}, &(0x7f0000000400)={0x0, 0xfffffffffffff026, 0x5, 0x4, 0x1}) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007440), 0x0, 0x0, &(0x7f0000007640)) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x200000, 0x0) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000280)=0x800) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000640)={0x81, 0x3, 0x7, 0xfffffffffffffbff, 0x2, 0x401, 0x5, 0x8001, 0x8, 0xc84, 0x7, 0x7f}) setsockopt$RDS_FREE_MR(r4, 0x114, 0x3, &(0x7f0000000440)={{0x100000001, 0x5}, 0x8}, 0x10) r6 = getpid() ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000180)={0x8, 0xfff, 0x0, 'queue0\x00', 0x10}) r7 = epoll_create1(0x0) ioctl$TUNGETFEATURES(r4, 0x800454cf, &(0x7f0000000300)) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r5, &(0x7f0000000140)) setsockopt$inet6_int(r4, 0x29, 0x7, &(0x7f00000000c0), 0x4) kcmp$KCMP_EPOLL_TFD(r6, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000480)={r7}) close(r5) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") sendmsg$IPVS_CMD_NEW_DEST(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8028020}, 0xc, &(0x7f0000000340)={&(0x7f00000004c0)=ANY=[@ANYBLOB="000100084a00000000000000ad7e248cdec3bf041d8c9553e2f58a6db3f73a433687b4404cf5001bc4b179a92658252f1b75aa4d3ecd90999bd34402012b5ecc6df6c64cb65d4d834d37e16b84fb05009e221eceab0f4bcef015d2749cbfd4216a5d8dbda8e2c181cbe20900000000000000f218e511c21eb000000000"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x4008000) ioctl$KDSKBSENT(r8, 0x4b49, &(0x7f0000000100)="3e931f1277e510f378eb775e8b128473d465d626cc9952527d8b567b390d69f6c447e68885b6ea136f7cf033188741bc28a7afef0e") getsockopt$inet_pktinfo(r8, 0x0, 0x8, &(0x7f0000000540)={0x0, @broadcast, @multicast2}, &(0x7f0000000580)=0xc) ioctl$sock_inet6_SIOCADDRT(r8, 0x890b, &(0x7f00000005c0)={@dev={0xfe, 0x80, [], 0xb}, @local, @ipv4, 0x7, 0xae80000000, 0x1, 0x500, 0x100000000, 0x0, r9}) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xfffffffffffff0aa, 0x111000) r10 = socket(0x40000000015, 0x801, 0x0) getsockopt(r10, 0x114, 0x271d, &(0x7f0000000040)=""/13, &(0x7f000033bffc)=0xd) ioctl$VT_RELDISP(r1, 0x5605) 00:26:38 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xf401000000000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:38 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x0]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:26:38 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xfe800000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1327.760970] XFS (loop3): invalid logbufsize: 68 [not 16k,32k,64k,128k or 256k] [ 1327.763357] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1327.784911] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:26:39 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:26:39 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) socket$inet(0x2, 0x3, 0x7) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'gre0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000400)=[{&(0x7f00000000c0)="8abf1951eeafe2fa067e0f73f23cbf045a4fd03bda0d5d152de67a55ce42810436b476bdcc327c9a9e98c1ccd496c1d208ab99d440f5c22031649ff1c27e8848fbda73a7db2a2974590a571f0c8233be70d8afa2fed43586e9128e040711e7fd37a87e0276543ce009250373be1a6f7f0e97c4329715cefe3bbd52ac4da4a7d5709352686b08f88e7d22a551ed36bb471df863ab80451d539151d9ff0f62a5d737eeea4cb154ca455c180bc1c233868c0c518a231808670c5a71f873690410d71e3a3e7f99a67614ba93d283aee855", 0xcf}, {&(0x7f00000001c0)="0b4d02ef15759f4ec50b45393dad9137c3291d0c61bd7229fd3b8152a1db8b3258ca90eaf8468ea81568da209d4f90cdb68d598c6be4750eb9837f8b3d486728697b9cf58585b9b5be4e9c7483cf1567e053fb08228fd4f47e1267be0ac367f8f25312d377d196590676ddf7e802dde51504933c24dc961b8832149e9f1c0858171378045b7d78b5c480cf02f1317dd0bf431082809915d751dec1e5865c", 0x9e}, {&(0x7f0000000280)="e98d6fd2740aaa7973cb9b6bcc", 0xd}, {&(0x7f00000002c0)="c1544487cd9442a12c83ebafb543d85caa00badf2e20901e367f4559ab360fea1b265c022d5dacc5b582fdce249bf15b1c55d5d25e1c344e4e133ff783276bb9c05e167f4eda1cb75babfb3e9627717e40194032da99b04574eab43eed605bb5eda4cd8cd34d887d65df8445cbf5e5921b07436bcd6d8684b14d17ab6eb800582b92ee822ce7a26f", 0x88}, {&(0x7f0000000380)="ccea78f76dab6050edb7975c47d04155757a68282d8f19a3c8ab0181aac7f6", 0x1f}, {&(0x7f00000003c0)="2f6a8b56382888bac2b46b41296aa2fbaf9462bb350a0a1bef97794e7985a3d8ca3d44544edaadc9ee7da226fca36d2adb21aa05", 0x34}], 0x6, &(0x7f0000002880)}}], 0x1, 0x0) [ 1328.015543] XFS (loop3): invalid logbufsize: 6144 [not 16k,32k,64k,128k or 256k] 00:26:39 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x140202, 0x0) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000040)=""/11) r2 = syz_open_dev$sndpcmp(&(0x7f000000afee)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup(r1) dup2(r2, r1) syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0xfffffffffffffc00, 0x200) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x6d) io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r3, 0x1, &(0x7f0000000100)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000040)}]) 00:26:39 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:26:39 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xb7100a0000000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:39 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0x500]}, 0x10) [ 1328.177273] XFS (loop3): invalid logbufsize: 6144 [not 16k,32k,64k,128k or 256k] [ 1328.248114] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1328.286937] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1328.769453] bridge0: port 1(bridge_slave_0) entered blocking state [ 1328.776131] bridge0: port 1(bridge_slave_0) entered disabled state [ 1328.783025] device bridge_slave_0 entered promiscuous mode [ 1328.807584] bridge0: port 2(bridge_slave_1) entered blocking state [ 1328.814032] bridge0: port 2(bridge_slave_1) entered disabled state [ 1328.820901] device bridge_slave_1 entered promiscuous mode [ 1328.846342] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1328.882906] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1328.950928] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1328.977385] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1329.001802] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1329.008770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1329.111354] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1329.118889] team0: Port device team_slave_0 added [ 1329.140440] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1329.147601] team0: Port device team_slave_1 added [ 1329.169027] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1329.192581] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1329.216608] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1329.223595] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1329.231945] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1329.255727] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1329.262719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1329.271239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1329.464552] bridge0: port 2(bridge_slave_1) entered blocking state [ 1329.470909] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1329.477553] bridge0: port 1(bridge_slave_0) entered blocking state [ 1329.483928] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1329.491146] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1329.974339] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1330.201633] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1330.272112] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1330.339787] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1330.345955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1330.352853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1330.422274] 8021q: adding VLAN 0 to HW filter on device team0 00:26:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000007c0)='io.weight\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xe8) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x80, 0x5, &(0x7f0000000440)=[{&(0x7f0000000080)="66349967e0a57fcc5c28622357818eb3a8e72fb84b0ade18b353b6cef79f5301a88868c22dd877f28ad298d158", 0x2d, 0x401}, {&(0x7f0000000100)="c62e5f7d427092560628a62fdbd2180d748db63b41699dd9baa8e3858d3b253d704aa469953639d51567ef52b3c7c198bf3a33df4fbc440df03ea78bd6ac1db19d7a584381ea", 0x46}, {&(0x7f00000001c0)="5efb9c97b7374775a61e8b498d3f7f47f3da5740acd0a40ff6497de13b7b78d7a6d1ca153771a65a0eed62102ff2ba1f25229e7488de20c6907f72fa99ed1f31939eab7eeca06e69359a43c3f394035d21d3ebe245c39003e0953be3d362dd09fda32378ad8e2931f863172e99adf6799621626c3e6f61af7855897abeed06ea6681dd860d4cac6e4c15c0899a5a7e671b59642933ced262611f6f053809fbf80b158b78ba7f670bc9390b325fdadddd0c03df9eac81a580ccc16b894cb303520b03102677d1a579bfb811963a22b9ae5b5cddfac8d9608eabc6379fad7747", 0xdf, 0x7}, {&(0x7f00000002c0)="5901f01e5ce41adf01d1157037b78703779bcee475aa4aff5797597ae1ea9707045a00a5142f386fa569bd4fede9d520b790dc6ef0f7fddf515951c7c1b900fdb7646c109364699f0d6c86831f96ba5c9cf6d6890e70d9034b7862691a12a69a3dcb7dc283f7f8d8203dcd8b7da90232429d2af51d4846a1431c728f258428904556bfc2079193e911744392", 0x8c, 0x7}, {&(0x7f0000000380)="b40002209a9f8b2d7a161cd9999eaed872aaf16345f77cf63394418a2e9425e0c481967ad9dc01d609ffeb1541972a8907b26ecd6a4a3f8e7ac355209845d62540db69bbd0ec2f53bca3c352a3a58bb60d90c41b46b17ab418a1f67b69f26d48598c3ffc6fbc208e01dba956f13c83e62c54ea4794a6006a9cad9053bc4327f88f725e8da348c3feede72a41599c48f31040c2dd78febc5f9f410f4a144a75ec57ac3cd6684b77", 0xa7, 0x4}], 0x20004, &(0x7f0000000600)={[{@nobarrier='nobarrier'}, {@notreelog='notreelog'}, {@device={'device', 0x3d, './file0'}}, {@noautodefrag='noautodefrag'}, {@flushoncommit='flushoncommit'}, {@subvol={'subvol', 0x3d, 'eth0wlan1keyring\\vmnet1\\wlan1'}}, {@nobarrier='nobarrier'}], [{@uid_lt={'uid<', r2}}, {@subj_type={'subj_type', 0x3d, './cgroup\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x33, 0x31, 0x65, 0x7d, 0x75, 0x66, 0x39], 0x2d, [0x62, 0x77, 0x39, 0x30], 0x2d, [0x77, 0x37, 0x71, 0x3a], 0x2d, [0x61, 0x7d, 0x31, 0x31], 0x2d, [0x3b, 0x7f, 0x32, 0x61, 0x7b, 0x77, 0x64, 0x36]}}}, {@dont_hash='dont_hash'}, {@dont_measure='dont_measure'}, {@subj_user={'subj_user', 0x3d, './cgroup\x00'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}]}) sendfile(r1, r1, &(0x7f00000000c0), 0xfdef) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000700)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 00:26:42 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x120669ed529, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:42 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:26:42 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="975b285effffaaaaaaaaaaff08004500002800000000000108ec177f0000000000000000907800000000000000000000000000000000dc8420a70c6983be061aec9d50d62c15ba0b2dc904ff53d1af2a7ad9eaceaffc3f0133aba5fb5be5c4073632c1211e2526878dc8845b7cb9df32446fd289c8e6784846e4d4a4b8bf0000"], &(0x7f00000000c0)={0x0, 0x0, [0x0, 0x486]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000000180)=""/198, 0xc6}, {&(0x7f0000000280)=""/1, 0x1}], 0x2) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x200000, 0x0) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000100)) r2 = shmget(0x3, 0x3000, 0x800, &(0x7f0000ffb000/0x3000)=nil) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000600)) getgroups(0x6, &(0x7f00000003c0)=[0xee00, 0x0, 0xee00, 0xee00, 0xee00, 0x0]) getresuid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)=0x0) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) r8 = getpgrp(0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000580)={{0x3, r3, r4, r5, r6, 0x2, 0x5}, 0x20, 0x3, 0x1, 0x2, r7, r8, 0x7c2}) 00:26:42 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x20000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:42 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0x6c]}, 0x10) [ 1330.852352] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1330.866730] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1330.868337] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 00:26:42 executing program 0: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x1, 0x100) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x8, 0x400000) r1 = open(&(0x7f0000000000)='./bus\x00', 0x200, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000380)={0x1, [0x0]}, &(0x7f00000003c0)=0x8) write$cgroup_type(r0, &(0x7f0000000340)='threaded\x00', 0xffffffc5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_SETFLAGS(r1, 0x401c5820, &(0x7f0000000040)) dup2(r2, r1) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4080004}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x4c, r3, 0x4, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ADDR={0x14}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4040040}, 0x80) 00:26:42 executing program 5: clone(0x210007fd, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r0 = syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x4, 0x1) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000180)={0x18, 0x0, {0x2, @remote, 'bpq0\x00'}}) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) write$uinput_user_dev(r2, &(0x7f0000000800)={'syz0\x00'}, 0x45c) name_to_handle_at(r0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0xd6, 0xfffffffeffffffff, "601afd0b0266ef772c6c7446ff1f43fe0e9aecce67538167713d043e39fe2f8733f1e1285b383a331bf8733a014d2c132b2bedce71567f1f77427727b454fd80d4b6e9c3f3e13ac181cd41f8758d873eb8db302a2dc0210e3fcbfe8128b5e417bf4ab3b8aeca374462bbd9e9ca58889de3aad6b3a5e27977e162eb7074035eaead8d533b91a42f18b5b50c34f565d0a5dd7b30041d7489efb1ecb49b0ad80676b61f8a4bb4148cfd4b9eff1548c9d4036c650afa162cdd30100458235999cc08bef904d4627966ef462e337ccdd5"}, &(0x7f0000000300), 0x1400) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x0, 0x4) fchmod(r1, 0x0) ioctl$UI_DEV_CREATE(r2, 0x5501) r3 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x81, 0x101080) setsockopt$inet_int(r3, 0x0, 0x27, &(0x7f0000000100)=0x7, 0x4) ioctl$TCFLSH(r3, 0x540b, 0x0) write$input_event(r2, &(0x7f0000000000)={{0x0, 0x2710}}, 0x10) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000140)={{0x1, 0x0, 0x0, 0x0, 0x7fd}}) [ 1330.896099] XFS (loop3): invalid logbufsize: 6144 [not 16k,32k,64k,128k or 256k] 00:26:42 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x0, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:26:42 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x12063040b2e, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1330.979721] input: syz0 as /devices/virtual/input/input32 [ 1331.016056] input: syz0 as /devices/virtual/input/input33 00:26:42 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x2724, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:42 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x0, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") [ 1331.072477] XFS (loop3): invalid logbufsize: 6 [not 16k,32k,64k,128k or 256k] [ 1331.099415] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:26:42 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xa0008000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:42 executing program 5: readv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/122, 0x7a}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000031, 0x4000000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000000c0)={0x4, 0x3ff, 0x0, 'queue0\x00'}) write$P9_RUNLINKAT(r0, &(0x7f0000000040)={0x7, 0x4d, 0x2}, 0x7) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000340)='./file0\x00', 0x8, 0x0) write$binfmt_elf64(r0, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], 0x5f1) [ 1331.191490] XFS (loop3): invalid logbufsize: 6 [not 16k,32k,64k,128k or 256k] [ 1331.207972] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:26:42 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x0, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:26:42 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x80, 0x0) ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f00000001c0)={[{0x2, 0xaa18, 0x5, 0x3f, 0x8, 0x700, 0x1, 0x1, 0x8, 0x8000, 0x20, 0x1, 0x3b}, {0x94, 0x2, 0x1, 0xa80, 0x3, 0x67, 0x7, 0x6, 0x0, 0x9, 0x1ff, 0xfffffffffffff7c2}, {0x3, 0x7, 0x20, 0xe1, 0xc8, 0x1, 0x80000000, 0x6, 0x2, 0x81, 0x3, 0x5, 0x3}], 0x80000000}) r1 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x9, 0x400000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x2, {0x8, 0x2, "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", 0x7e, 0xffffffff, 0x5, 0x2, 0x78b, 0x101, 0x400080, 0x1}, r2}}, 0x128) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f0000000280)) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000680)=0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) unshare(0x40000000) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f00000005c0)={{0x9}, "706f72743000000000000000000e00", 0x0, 0x50, 0x6, 0x0, 0x0, 0x1, 0x101}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x5) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000540)={{0x2, 0x4e24, @rand_addr=0x300000000}, {0x306}, 0xa, {0x2, 0x4e22, @broadcast}, 'veth0_to_bridge\x00'}) munlockall() memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x800) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000480)={0xfffffffffffffff8, {{0x2, 0x4e24, @broadcast}}}, 0x88) 00:26:42 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xe803000000000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1331.412603] XFS (loop3): invalid logbufsize: 6 [not 16k,32k,64k,128k or 256k] [ 1331.504617] QAT: Invalid ioctl [ 1331.549319] IPVS: ftp: loaded support on port[0] = 21 00:26:42 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0x4c]}, 0x10) 00:26:42 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x8, &(0x7f0000000100), 0x4) 00:26:42 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x600000000000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:42 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xff0f, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:42 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") [ 1331.810160] XFS (loop3): invalid logbufsize: 8192 [not 16k,32k,64k,128k or 256k] [ 1331.900566] device bridge_slave_1 left promiscuous mode [ 1331.906267] bridge0: port 2(bridge_slave_1) entered disabled state 00:26:43 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x10000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1331.944840] device bridge_slave_0 left promiscuous mode [ 1331.950502] bridge0: port 1(bridge_slave_0) entered disabled state 00:26:43 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xa0008000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1332.078112] IPVS: ftp: loaded support on port[0] = 21 [ 1332.104089] team0 (unregistering): Port device team_slave_1 removed [ 1332.118072] team0 (unregistering): Port device team_slave_0 removed [ 1332.130529] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1332.157328] QAT: Invalid ioctl 00:26:43 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x50000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1332.181554] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1332.290661] QAT: Invalid ioctl 00:26:43 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x900, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1332.317426] IPVS: ftp: loaded support on port[0] = 21 [ 1332.328600] bond0 (unregistering): Released all slaves [ 1332.437260] net_ratelimit: 6 callbacks suppressed [ 1332.437352] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1332.456857] QAT: Invalid ioctl 00:26:43 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:26:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x6, 0x40200) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000010307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) [ 1332.557494] XFS (loop3): invalid logbufsize: 8192 [not 16k,32k,64k,128k or 256k] 00:26:43 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x1392, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:43 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0x74]}, 0x10) [ 1332.673569] netlink: 20 bytes leftover after parsing attributes in process `syz-executor5'. [ 1332.706379] netlink: 20 bytes leftover after parsing attributes in process `syz-executor5'. [ 1332.766361] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1333.245695] bridge0: port 1(bridge_slave_0) entered blocking state [ 1333.252081] bridge0: port 1(bridge_slave_0) entered disabled state [ 1333.259532] device bridge_slave_0 entered promiscuous mode [ 1333.294588] bridge0: port 2(bridge_slave_1) entered blocking state [ 1333.300991] bridge0: port 2(bridge_slave_1) entered disabled state [ 1333.308055] device bridge_slave_1 entered promiscuous mode [ 1333.331559] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1333.366416] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1333.431610] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1333.456576] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1333.480271] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1333.487350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1333.510503] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1333.517355] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1333.600288] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1333.607601] team0: Port device team_slave_0 added [ 1333.630107] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1333.637183] team0: Port device team_slave_1 added [ 1333.658507] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1333.683365] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1333.707853] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1333.715148] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1333.722887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1333.745831] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1333.752808] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1333.761639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1333.965106] bridge0: port 2(bridge_slave_1) entered blocking state [ 1333.971470] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1333.978119] bridge0: port 1(bridge_slave_0) entered blocking state [ 1333.984480] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1333.991937] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1334.443940] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1334.938773] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1335.007159] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1335.076772] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1335.082880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1335.090599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1335.161435] 8021q: adding VLAN 0 to HW filter on device team0 00:26:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000040), &(0x7f0000000140)=0x18) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000300)=ANY=[], &(0x7f0000000340)) time(&(0x7f0000000000)) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 00:26:46 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:26:46 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xfffffff5, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:46 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xfc, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:46 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x900, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:46 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0x700]}, 0x10) [ 1335.606147] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1335.611788] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:26:46 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x10e00, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:46 executing program 0: r0 = socket$inet6(0xa, 0xa, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000140), &(0x7f0000000180)=0x14) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000280)=0xff, 0x4) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xb4d3, 0x1) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc058534f, &(0x7f0000000080)={{0x7, 0x800}, 0x1, 0x4, 0xe0, {0x1000, 0x10000}, 0x25, 0x1000}) sendmmsg(r1, &(0x7f00000002c0), 0x400000000000012, 0x0) [ 1335.653549] XFS (loop3): invalid logbufsize: 8192 [not 16k,32k,64k,128k or 256k] 00:26:46 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x0, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:26:47 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000d08ff7)='/dev/sg#\x00', 0x0, 0x81) r1 = gettid() fcntl$dupfd(r0, 0x406, r0) timer_create(0x4000000000000000, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000000000)) tkill(r1, 0x1004000000016) close(r0) [ 1335.780379] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:26:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f00000000c0), 0xffffffffffffff45, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) lseek(0xffffffffffffffff, 0x0, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r2, 0x401104000000016) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000804589bff7669ec9350000000000000000000000000000000000000000000000000000000000f3ffffffffffffff0000000000000000"], 0xb8}}, 0x0) [ 1335.879885] XFS (loop3): unknown mount option [logbsize=]. 00:26:47 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x30a16b9499000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:47 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x0, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:26:47 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x3b000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1336.014951] XFS (loop3): unknown mount option [logbsize=]. [ 1336.017229] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:26:47 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x0, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") [ 1336.132939] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:26:47 executing program 0: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00'}, 0x10) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000100), 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000007c0)=@bridge_getlink={0x20, 0x12, 0x101}, 0x20}}, 0x0) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f00000004c0)={0x1, 0x100000001}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e21, 0x849, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x15}}, 0x9}}, 0x6, 0x9}, &(0x7f0000000100)=0x90) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000400)={r2, @in6={{0xa, 0x4e24, 0x2, @dev={0xfe, 0x80, [], 0x20}, 0x1}}}, &(0x7f00000001c0)=0x84) setxattr(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)=@known='trusted.syz\x00', &(0x7f0000000580)='\x00', 0x1, 0x1) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[], 0x0, 0x680}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 1336.183104] XFS (loop3): unknown mount option [logbsize=]. [ 1336.335803] IPVS: ftp: loaded support on port[0] = 21 00:26:47 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x900, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:47 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:26:47 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xfc00, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:47 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0xa00]}, 0x10) 00:26:47 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xff00000000000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1336.459416] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1336.473099] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1336.489732] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1336.492207] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] 00:26:47 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") [ 1336.575361] device bridge_slave_1 left promiscuous mode [ 1336.580951] bridge0: port 2(bridge_slave_1) entered disabled state 00:26:47 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x20000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1336.638500] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1336.665637] device bridge_slave_0 left promiscuous mode [ 1336.671290] bridge0: port 1(bridge_slave_0) entered disabled state 00:26:47 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:26:47 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x11000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1336.762090] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1336.790371] team0 (unregistering): Port device team_slave_1 removed 00:26:48 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") [ 1336.807703] team0 (unregistering): Port device team_slave_0 removed [ 1336.821995] bond0 (unregistering): Releasing backup interface bond_slave_1 00:26:48 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x4002, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1336.867608] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1336.878170] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1336.953387] bond0 (unregistering): Released all slaves [ 1337.517461] bridge0: port 1(bridge_slave_0) entered blocking state [ 1337.523952] bridge0: port 1(bridge_slave_0) entered disabled state [ 1337.531082] device bridge_slave_0 entered promiscuous mode [ 1337.566047] bridge0: port 2(bridge_slave_1) entered blocking state [ 1337.572445] bridge0: port 2(bridge_slave_1) entered disabled state [ 1337.579949] device bridge_slave_1 entered promiscuous mode [ 1337.613160] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1337.635601] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1337.718196] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1337.742267] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1337.849916] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1337.857025] team0: Port device team_slave_0 added [ 1337.878240] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1337.885403] team0: Port device team_slave_1 added [ 1337.906107] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1337.929411] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1337.952274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1337.977450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1338.175848] bridge0: port 2(bridge_slave_1) entered blocking state [ 1338.182231] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1338.188986] bridge0: port 1(bridge_slave_0) entered blocking state [ 1338.195374] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1338.202811] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1338.910576] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1338.979834] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1339.050301] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1339.056472] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1339.063507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1339.070881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1339.137193] 8021q: adding VLAN 0 to HW filter on device team0 00:26:50 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x4002, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:50 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xfc00, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:50 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:26:50 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x91ffffff00000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:50 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0x2]}, 0x10) 00:26:50 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x900, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1339.570730] net_ratelimit: 3 callbacks suppressed [ 1339.570746] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1339.592168] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1339.605840] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:26:50 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") [ 1339.632012] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1339.707384] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] 00:26:50 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x92130000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:50 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xa10b7, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:50 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="88f96234488dd25d766070") 00:26:51 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x4002, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1339.846125] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1339.859713] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] 00:26:51 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x2000000000000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:51 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="88f96234488dd25d766070") [ 1339.929020] IPVS: ftp: loaded support on port[0] = 21 00:26:51 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x15554, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1339.980081] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1339.997559] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] 00:26:51 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="88f96234488dd25d766070") [ 1340.053327] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1340.096903] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] 00:26:51 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x500000000000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1340.174344] device bridge_slave_1 left promiscuous mode [ 1340.180061] bridge0: port 2(bridge_slave_1) entered disabled state [ 1340.206429] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1340.246634] device bridge_slave_0 left promiscuous mode [ 1340.252100] bridge0: port 1(bridge_slave_0) entered disabled state [ 1340.318707] team0 (unregistering): Port device team_slave_1 removed [ 1340.328093] team0 (unregistering): Port device team_slave_0 removed [ 1340.337366] bond0 (unregistering): Releasing backup interface bond_slave_1 00:26:51 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0x3]}, 0x10) 00:26:51 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x92130000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:51 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)) 00:26:51 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x12066424a84, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1340.378575] bond0 (unregistering): Releasing backup interface bond_slave_0 00:26:51 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x900000000000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1340.442915] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1340.470589] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1340.483288] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1340.498770] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1340.540805] bond0 (unregistering): Released all slaves 00:26:51 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)) [ 1340.649213] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1341.147372] bridge0: port 1(bridge_slave_0) entered blocking state [ 1341.154184] bridge0: port 1(bridge_slave_0) entered disabled state [ 1341.161512] device bridge_slave_0 entered promiscuous mode [ 1341.197881] bridge0: port 2(bridge_slave_1) entered blocking state [ 1341.204337] bridge0: port 2(bridge_slave_1) entered disabled state [ 1341.211341] device bridge_slave_1 entered promiscuous mode [ 1341.235956] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1341.290712] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1341.373123] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1341.398321] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1341.510960] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1341.518185] team0: Port device team_slave_0 added [ 1341.539356] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1341.546459] team0: Port device team_slave_1 added [ 1341.567941] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1341.590938] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1341.613988] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1341.620964] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1341.630137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1341.648823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1341.846356] bridge0: port 2(bridge_slave_1) entered blocking state [ 1341.852714] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1341.859368] bridge0: port 1(bridge_slave_0) entered blocking state [ 1341.865723] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1342.576165] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1342.648380] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1342.718315] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1342.724468] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1342.731350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1342.802555] 8021q: adding VLAN 0 to HW filter on device team0 00:26:54 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x4002, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:54 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x801000cf00000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:54 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x8030100000000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:54 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)) 00:26:54 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0xf]}, 0x10) 00:26:54 executing program 5: r0 = socket$inet(0x10, 0x1, 0x20) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000100007031dfffd946ff20c0020200a0007000100021d85680c1baba20400ff7e", 0x24}], 0x1ac, 0x0, 0x2a2, 0x100000000000}, 0x0) [ 1343.271625] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] 00:26:54 executing program 0: r0 = socket$kcm(0x2, 0x5, 0x0) connect(r0, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80) msgget(0x0, 0x100) 00:26:54 executing program 5: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x4ef6, 0x4000) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f00000002c0)=0x4, 0x8) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(r1, &(0x7f00000003c0)={0xa6, 0x29, 0x1, {0x0, [{{}, 0x0, 0x0, 0x7, './file0'}, {{}, 0x0, 0x0, 0x7, './file0'}, {{}, 0x0, 0x0, 0x7, './file0'}, {{}, 0x0, 0x0, 0x7, './file0'}, {{}, 0x0, 0x0, 0xffffffffffffff07, './file0'}]}}, 0xa6) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000680)='9p\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c02000000000000003770284761a709c98432d65820c893ce54dcb223327430fbfeed9e83817c0a94abb3b031960d6e1ef5b5f76e97e196b7bdf41c63d689020078f3bc9cc3f4cf2f6da3ca848ec7c1982e14e300ded86ed5ff5a5b5b5dd797ccbf3b7bff406bfc636be8fa5b433dc98bccb90097fb872963b0b2470d0be4fb774541b974ac3c9a1e672357023c5cefbceeec136ce9d15fe45eedf48e8aa45ef051c67ff50cbd4f38bc691424afe9cca0f8209a0adec1821ed3c9d084b825b7c3ad31b91a9a267cccba3f5e30fe30df053e52acca373a8ff092919c562e65f1880dd2f27845432cc1dbc68aa6b77da92b3e044f"]) 00:26:54 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488d") 00:26:54 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xf5ffffff, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:54 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x202000, 0x24) sendfile(r0, r1, 0x0, 0x2) r2 = socket$alg(0x26, 0x5, 0x0) remap_file_pages(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000005, 0x52, 0x4900) bind$alg(r2, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvfrom(r3, &(0x7f0000000040)=""/147, 0x93, 0x0, &(0x7f00000005c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x705000) [ 1343.450493] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] 00:26:54 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488d") 00:26:54 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xe00, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:54 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f0000000080)={r1, 0x1}) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x806, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x29, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000001c0)={0x0, @in6, 0x0, 0x0, 0x0, 0x2, 0x4}, &(0x7f0000000280)=0x98) 00:26:54 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xe204, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1343.605704] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] 00:26:54 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xb, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="850000000400000125000000000095944d6900220000000003c49c57cd908665e677ddd460c78f961fc92a2ded191ada147eccbf948952e78a4c0183a8e9781e07e58a46308ca2551bf39ebe9a841079a8726d8aabe745ed4099cc2e8800dd4b2d87a385d0a3efc844f71a749f2b630034fa43b19a6c26df507c6dde2903376aaa1831d00f735e50f5a4048b8d996d3b5fbafdcbc6d191da917b13e80d3b1f130814ed2910f7774b456c2d72edea6c09"], &(0x7f0000000000)="504c20004cf7d12af11ce92537b5e3191e66de5d4ec18e4c2df01484a86d77842f624946eae310794c8c96ff1466232e25951139bda5d2990e523f8ec3080ffc1224d8dc4c84a9c8e8ab31576806715523fa749e8615c61049b8b1be6aa7740702cc5add", 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) [ 1343.795263] IPVS: ftp: loaded support on port[0] = 21 [ 1343.894863] device bridge_slave_1 left promiscuous mode [ 1343.900403] bridge0: port 2(bridge_slave_1) entered disabled state [ 1343.944775] device bridge_slave_0 left promiscuous mode [ 1343.950316] bridge0: port 1(bridge_slave_0) entered disabled state [ 1343.997831] team0 (unregistering): Port device team_slave_1 removed [ 1344.006671] team0 (unregistering): Port device team_slave_0 removed [ 1344.016787] bond0 (unregistering): Releasing backup interface bond_slave_1 00:26:55 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0x500000000000000]}, 0x10) 00:26:55 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488d") 00:26:55 executing program 5: r0 = socket$packet(0x11, 0x80002, 0x300) read(r0, &(0x7f0000000080)=""/69, 0x45) r1 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") pselect6(0x381, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000300)={0x0, 0x0, 0x0, 0x800000000000}, &(0x7f0000000340)={0x0, 0x1c9c380}, &(0x7f00000003c0)={&(0x7f0000000380), 0x8}) 00:26:55 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xe803, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:55 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x60e6120000000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1344.046427] bond0 (unregistering): Releasing backup interface bond_slave_0 00:26:55 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x3204, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1344.117967] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1344.144712] bond0 (unregistering): Released all slaves 00:26:55 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d76") 00:26:55 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x4c1d000000000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:55 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x1f5, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1344.281098] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1344.828754] bridge0: port 1(bridge_slave_0) entered blocking state [ 1344.835357] bridge0: port 1(bridge_slave_0) entered disabled state [ 1344.842239] device bridge_slave_0 entered promiscuous mode [ 1344.877850] bridge0: port 2(bridge_slave_1) entered blocking state [ 1344.884369] bridge0: port 2(bridge_slave_1) entered disabled state [ 1344.891612] device bridge_slave_1 entered promiscuous mode [ 1344.920044] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1344.967642] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1345.060147] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1345.087270] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1345.186752] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1345.194693] team0: Port device team_slave_0 added [ 1345.217309] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1345.224496] team0: Port device team_slave_1 added [ 1345.247162] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1345.272845] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1345.296947] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1345.321647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1345.530424] bridge0: port 2(bridge_slave_1) entered blocking state [ 1345.536992] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1345.543558] bridge0: port 1(bridge_slave_0) entered blocking state [ 1345.549932] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1345.557375] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1346.295408] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1346.367871] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1346.441687] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1346.447867] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1346.455256] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1346.503943] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1346.530971] 8021q: adding VLAN 0 to HW filter on device team0 00:26:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000300)=0x1, 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000004600)=[{{&(0x7f0000000b40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000002100)=[{&(0x7f0000001100)=""/4096, 0x1000}, {&(0x7f0000000e40)=""/120, 0x78}], 0x2}}], 0x1, 0x0, &(0x7f00000046c0)) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x7, 0x880) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000040)={'team_slave_0\x00', {0x2, 0x4e21, @remote}}) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x800, 0x0) r3 = geteuid() r4 = getgid() getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000280)=0xe8) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = geteuid() stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000580)={0x2b0, 0xfffffffffffffffe, 0x8, [{{0x6, 0x3, 0x2, 0x6, 0x9, 0x4, {0x0, 0x400, 0xc6c, 0x401, 0x9, 0x2, 0x5863, 0x8, 0x2, 0x1, 0x401, r3, r4, 0x2, 0x9}}, {0x4, 0x5, 0x11, 0x271, '/bdevsecurityeth0'}}, {{0x1, 0x0, 0x2, 0xffff, 0x1, 0x80000001, {0x5, 0x2, 0x100, 0x6ae8, 0xf1, 0x81, 0x3df2, 0xd5, 0x2, 0xffffffffffffffff, 0x1, r5, r6, 0x2, 0x80000000}}, {0x2, 0x7, 0x3, 0x7, "2c8621"}}, {{0x3, 0x2, 0xffffffff7fffffff, 0xfffffffffffffe01, 0x7fffffff, 0x1, {0x4, 0xfff, 0x3, 0x10001, 0x1, 0x2, 0x200, 0xff, 0x5, 0x327, 0x1000, r7, r8, 0xcc2, 0xfffffffffffffffd}}, {0x2, 0xff, 0xb, 0x5b9, '/dev/loop#\x00'}}, {{0x6, 0x3, 0x6, 0x1, 0x98, 0x100, {0x3, 0x5, 0x40, 0x8, 0x4, 0x1, 0x100000000, 0x6, 0x4, 0x1, 0x1, r9, r10, 0xfffffffffffffffd, 0x200}}, {0x5, 0x3, 0xd, 0x5, 'team_slave_0\x00'}}]}, 0x2b0) 00:26:58 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d76") 00:26:58 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x7edef36320010000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:58 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x1f4, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:58 executing program 5: r0 = creat(&(0x7f0000000340)='./file0\x00', 0x4) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000380), &(0x7f00000003c0)=0x8) r1 = socket$inet6(0xa, 0x1000000000003, 0x20) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") accept$inet6(r0, &(0x7f0000000400)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f0000000440)=0x1c) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbbf4}, 0xc, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="5c000000220001000400000048001100e2abb4ec7645192056d52f76aacc17fd28d66a75a08d136f699d897bdabf4fd3c08e579e07000000000000009693e7bb692f4b745133ce6266b2a62bbacd9d21aa000000ffe9c689189c05df15"], 0x5c}}, 0x0) r3 = accept4(r1, &(0x7f0000000140)=@generic, &(0x7f0000000000)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000001c0)={0x0, 0x1000, 0xfff}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000240)={0x80000000, 0xffffffffffffffff, 0x800c, 0x8000, 0x1, 0x0, 0x4, 0x3, r4}, &(0x7f00000002c0)=0x20) syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x0) 00:26:58 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0x4c00]}, 0x10) 00:26:58 executing program 0: socketpair(0x2, 0xb, 0x80000000, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000140)=[@text16={0x10, &(0x7f00000000c0)="980f00dd0f20e06635040000000f22e066b9e30a000066b80700000066ba000000000f30baf80c66b8baa8b38a66efbafc0ced0f300f211c360fc7990ec1fe4502ba430066b89800000066ef", 0x4c}], 0x1, 0x8, &(0x7f0000000180)=[@cstype0={0x4, 0x2}, @efer={0x2, 0xa800}], 0x2) io_setup(0x3, &(0x7f0000000240)=0x0) r3 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x0, 0x0) close(r3) socket$inet6_dccp(0xa, 0x6, 0x0) io_submit(r2, 0x1, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0x0, r3, 0x0}]) [ 1346.991065] net_ratelimit: 9 callbacks suppressed [ 1346.991078] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1347.009633] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1347.028303] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 00:26:58 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x8dffffff00000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:58 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d76") 00:26:58 executing program 5: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000140)) chdir(&(0x7f0000000000)='./file0\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x19, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000000140)={0x5, 0x6, 0x10000, 0x3}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8012, r2, 0x0) 00:26:58 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) bind$xdp(r1, &(0x7f0000000100)={0x2c, 0x6, r2, 0x39, r1}, 0x10) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0xfffffffffffffffc, 0xfffffffffffffffd) dup3(r1, r0, 0x0) [ 1347.175808] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1347.203710] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] 00:26:58 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x8dffffff, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:58 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d7660") [ 1347.306125] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1347.340609] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] 00:26:58 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x61da639499000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:58 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d7660") [ 1347.469471] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1347.511789] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] 00:26:58 executing program 3: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d7660") 00:26:58 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x3000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1347.700091] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1347.709504] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:26:59 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0x1100]}, 0x10) 00:26:59 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x61da639499000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:59 executing program 0: r0 = socket$inet(0x2, 0x7, 0xae58) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000000)={@multicast2, @multicast2}, 0x8) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000200000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000180)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x220001, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) r2 = socket$inet6(0xa, 0x0, 0x800000000000002) ioctl(r2, 0x8912, &(0x7f0000000100)="153f6234488dd25d766070") setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000200)={{0x2c, @multicast2, 0x4e24, 0x3, 'wlc\x00', 0x4, 0x4, 0x17}, {@rand_addr, 0x4e21, 0x3, 0x4, 0x8000, 0x7}}, 0x44) 00:26:59 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xc000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:59 executing program 3 (fault-call:0 fault-nth:0): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") [ 1347.879952] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1347.892819] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1347.900122] FAULT_INJECTION: forcing a failure. [ 1347.900122] name failslab, interval 1, probability 0, space 0, times 0 [ 1347.911893] CPU: 0 PID: 3129 Comm: syz-executor3 Not tainted 4.19.0-rc6+ #269 [ 1347.919182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1347.928543] Call Trace: [ 1347.928574] dump_stack+0x1c4/0x2b4 [ 1347.928600] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1347.928621] ? lock_downgrade+0x900/0x900 [ 1347.928645] should_fail.cold.4+0xa/0x17 [ 1347.948242] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1347.953350] ? __f_unlock_pos+0x19/0x20 [ 1347.957340] ? lock_downgrade+0x900/0x900 [ 1347.961496] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1347.967036] ? proc_fail_nth_write+0x9e/0x210 [ 1347.971542] ? proc_cwd_link+0x1d0/0x1d0 [ 1347.975601] ? kasan_check_read+0x11/0x20 [ 1347.979749] ? do_raw_spin_unlock+0xa7/0x2f0 [ 1347.984165] ? fs_reclaim_acquire+0x20/0x20 [ 1347.988493] ? lock_downgrade+0x900/0x900 [ 1347.992640] ? wait_for_completion+0x8a0/0x8a0 [ 1347.997244] ? ___might_sleep+0x1ed/0x300 [ 1348.001391] ? fsnotify_first_mark+0x350/0x350 [ 1348.005976] ? arch_local_save_flags+0x40/0x40 [ 1348.010557] ? fsnotify+0x12f0/0x12f0 [ 1348.014634] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1348.020178] __should_failslab+0x124/0x180 [ 1348.024447] should_failslab+0x9/0x14 [ 1348.028264] __kmalloc+0x2d4/0x760 [ 1348.031815] ? strncpy_from_user+0x510/0x510 [ 1348.036570] ? fput+0x130/0x1a0 [ 1348.040564] ? __x64_sys_memfd_create+0x142/0x4f0 [ 1348.046190] __x64_sys_memfd_create+0x142/0x4f0 [ 1348.051042] ? memfd_fcntl+0x1230/0x1230 [ 1348.055111] do_syscall_64+0x1b9/0x820 [ 1348.059176] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1348.064543] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1348.069479] ? trace_hardirqs_on_caller+0x310/0x310 [ 1348.074511] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1348.079526] ? recalc_sigpending_tsk+0x180/0x180 [ 1348.084283] ? kasan_check_write+0x14/0x20 [ 1348.088518] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1348.093366] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1348.098568] RIP: 0033:0x457579 [ 1348.101773] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1348.120894] RSP: 002b:00007ff838176a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 00:26:59 executing program 3 (fault-call:0 fault-nth:1): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:26:59 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x18020000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1348.128598] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000457579 [ 1348.135865] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc7c9 [ 1348.143910] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1348.151695] R10: 0000000020000140 R11: 0000000000000246 R12: 00007ff8381776d4 [ 1348.158958] R13: 00000000004c4b77 R14: 00000000004d7ef0 R15: 0000000000000003 [ 1348.234363] device bridge_slave_1 left promiscuous mode [ 1348.240501] FAULT_INJECTION: forcing a failure. [ 1348.240501] name failslab, interval 1, probability 0, space 0, times 0 [ 1348.242806] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1348.252814] bridge0: port 2(bridge_slave_1) entered disabled state [ 1348.279718] CPU: 1 PID: 3140 Comm: syz-executor3 Not tainted 4.19.0-rc6+ #269 [ 1348.287010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1348.296366] Call Trace: [ 1348.299006] dump_stack+0x1c4/0x2b4 [ 1348.302662] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1348.307894] should_fail.cold.4+0xa/0x17 [ 1348.312020] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1348.317136] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1348.322168] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 1348.326941] ? is_bpf_text_address+0xac/0x170 [ 1348.332074] ? lock_downgrade+0x900/0x900 [ 1348.336260] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1348.342071] ? kasan_check_read+0x11/0x20 [ 1348.346247] ? fs_reclaim_acquire+0x20/0x20 [ 1348.350582] ? lock_downgrade+0x900/0x900 [ 1348.354747] ? ___might_sleep+0x1ed/0x300 [ 1348.358913] ? expand_files.part.8+0x571/0x9a0 [ 1348.363505] ? arch_local_save_flags+0x40/0x40 [ 1348.368105] ? iterate_fd+0x4b0/0x4b0 [ 1348.371915] ? __save_stack_trace+0x8d/0xf0 [ 1348.376278] __should_failslab+0x124/0x180 [ 1348.380521] should_failslab+0x9/0x14 [ 1348.384334] kmem_cache_alloc+0x2be/0x730 [ 1348.388498] ? shmem_destroy_callback+0xc0/0xc0 [ 1348.393183] shmem_alloc_inode+0x1b/0x40 [ 1348.397269] alloc_inode+0x63/0x190 [ 1348.400907] new_inode_pseudo+0x71/0x1a0 [ 1348.404969] ? prune_icache_sb+0x1c0/0x1c0 [ 1348.409222] ? _raw_spin_unlock+0x2c/0x50 [ 1348.413372] new_inode+0x1c/0x40 [ 1348.416742] shmem_get_inode+0xf1/0x920 [ 1348.420717] ? shmem_encode_fh+0x340/0x340 [ 1348.424991] ? lock_downgrade+0x900/0x900 [ 1348.429145] ? lock_release+0x970/0x970 [ 1348.433115] ? arch_local_save_flags+0x40/0x40 [ 1348.437712] ? usercopy_warn+0x110/0x110 [ 1348.441781] __shmem_file_setup.part.45+0x83/0x2a0 [ 1348.446724] shmem_file_setup+0x65/0x90 [ 1348.450701] __x64_sys_memfd_create+0x2af/0x4f0 [ 1348.455370] ? memfd_fcntl+0x1230/0x1230 [ 1348.459439] do_syscall_64+0x1b9/0x820 [ 1348.463335] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1348.468712] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1348.473645] ? trace_hardirqs_on_caller+0x310/0x310 [ 1348.478661] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1348.483681] ? recalc_sigpending_tsk+0x180/0x180 [ 1348.488435] ? kasan_check_write+0x14/0x20 [ 1348.492672] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1348.497519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1348.502706] RIP: 0033:0x457579 [ 1348.505901] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1348.524796] RSP: 002b:00007ff838176a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1348.532504] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000457579 [ 1348.539769] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc7c9 [ 1348.547037] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1348.554302] R10: 0000000020000140 R11: 0000000000000246 R12: 00007ff8381776d4 [ 1348.561567] R13: 00000000004c4b77 R14: 00000000004d7ef0 R15: 0000000000000003 [ 1348.583550] IPVS: ftp: loaded support on port[0] = 21 00:26:59 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x15554, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1348.614743] device bridge_slave_0 left promiscuous mode [ 1348.620359] bridge0: port 1(bridge_slave_0) entered disabled state 00:26:59 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x61da639499000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:59 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0x60]}, 0x10) 00:26:59 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x300, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:26:59 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x47, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1348.731324] team0 (unregistering): Port device team_slave_1 removed [ 1348.749590] team0 (unregistering): Port device team_slave_0 removed [ 1348.760803] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1348.788036] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1348.796531] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 00:27:00 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x201, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1348.864493] bond0 (unregistering): Released all slaves 00:27:00 executing program 3 (fault-call:0 fault-nth:2): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") [ 1348.961953] FAULT_INJECTION: forcing a failure. [ 1348.961953] name failslab, interval 1, probability 0, space 0, times 0 [ 1348.974022] CPU: 1 PID: 3173 Comm: syz-executor3 Not tainted 4.19.0-rc6+ #269 [ 1348.981313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1348.990665] Call Trace: [ 1348.990694] dump_stack+0x1c4/0x2b4 [ 1348.990719] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1349.002097] ? mark_held_locks+0x130/0x130 [ 1349.006346] should_fail.cold.4+0xa/0x17 [ 1349.010428] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1349.015535] ? __kernel_text_address+0xd/0x40 [ 1349.015552] ? unwind_get_return_address+0x61/0xa0 [ 1349.015571] ? __save_stack_trace+0x8d/0xf0 [ 1349.015594] ? save_stack+0xa9/0xd0 [ 1349.025005] ? __lockdep_init_map+0x105/0x590 [ 1349.025017] ? kasan_kmalloc+0xc7/0xe0 [ 1349.025041] ? fs_reclaim_acquire+0x20/0x20 [ 1349.032985] ? lock_downgrade+0x900/0x900 [ 1349.041344] ? ___might_sleep+0x1ed/0x300 [ 1349.041368] ? arch_local_save_flags+0x40/0x40 [ 1349.050091] __should_failslab+0x124/0x180 [ 1349.059242] should_failslab+0x9/0x14 [ 1349.067258] kmem_cache_alloc+0x2be/0x730 [ 1349.067275] ? mpol_shared_policy_init+0x235/0x650 [ 1349.067290] ? current_time+0x72/0x1b0 [ 1349.067307] __d_alloc+0xc8/0xcc0 [ 1349.076374] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 1349.076391] ? ktime_get_coarse_real_ts64+0x243/0x3b0 [ 1349.076413] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1349.083744] ? timespec64_trunc+0xea/0x180 [ 1349.093939] ? inode_init_owner+0x340/0x340 [ 1349.093957] ? _raw_spin_unlock+0x2c/0x50 [ 1349.093982] ? current_time+0x131/0x1b0 [ 1349.094003] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1349.103776] ? check_preemption_disabled+0x48/0x200 [ 1349.112248] ? __lockdep_init_map+0x105/0x590 [ 1349.121750] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1349.121766] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1349.121784] d_alloc_pseudo+0x1d/0x30 [ 1349.131288] alloc_file_pseudo+0x158/0x3f0 [ 1349.142613] ? alloc_file+0x4d0/0x4d0 [ 1349.150635] ? usercopy_warn+0x110/0x110 [ 1349.150652] ? kasan_check_write+0x14/0x20 [ 1349.150675] __shmem_file_setup.part.45+0x110/0x2a0 [ 1349.158519] shmem_file_setup+0x65/0x90 [ 1349.167752] __x64_sys_memfd_create+0x2af/0x4f0 [ 1349.167767] ? memfd_fcntl+0x1230/0x1230 [ 1349.167793] do_syscall_64+0x1b9/0x820 [ 1349.176593] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1349.176613] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1349.176634] ? trace_hardirqs_on_caller+0x310/0x310 [ 1349.184574] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1349.184592] ? recalc_sigpending_tsk+0x180/0x180 [ 1349.184607] ? kasan_check_write+0x14/0x20 [ 1349.184627] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1349.194913] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1349.194926] RIP: 0033:0x457579 [ 1349.194946] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1349.204956] RSP: 002b:00007ff838176a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1349.204981] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000457579 [ 1349.204990] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc7c9 [ 1349.205004] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1349.215222] R10: 0000000020000140 R11: 0000000000000246 R12: 00007ff8381776d4 [ 1349.215232] R13: 00000000004c4b77 R14: 00000000004d7ef0 R15: 0000000000000003 [ 1349.880063] bridge0: port 1(bridge_slave_0) entered blocking state [ 1349.886570] bridge0: port 1(bridge_slave_0) entered disabled state [ 1349.893449] device bridge_slave_0 entered promiscuous mode [ 1349.928020] bridge0: port 2(bridge_slave_1) entered blocking state [ 1349.934538] bridge0: port 2(bridge_slave_1) entered disabled state [ 1349.941803] device bridge_slave_1 entered promiscuous mode [ 1349.966510] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1349.990254] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1350.072864] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1350.099436] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1350.195250] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1350.202331] team0: Port device team_slave_0 added [ 1350.223638] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1350.230721] team0: Port device team_slave_1 added [ 1350.251685] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1350.276559] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1350.299774] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1350.306824] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1350.315393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1350.333810] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1350.340876] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1350.349408] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1350.547516] bridge0: port 2(bridge_slave_1) entered blocking state [ 1350.553932] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1350.560511] bridge0: port 1(bridge_slave_0) entered blocking state [ 1350.566895] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1350.574344] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1350.954152] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1351.302378] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1351.379318] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1351.455122] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1351.461265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1351.468792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1351.540504] 8021q: adding VLAN 0 to HW filter on device team0 00:27:03 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x18020000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:27:03 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xf49110000000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:27:03 executing program 3 (fault-call:0 fault-nth:3): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:27:03 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x1ce5, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:27:03 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x61da639499000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:27:03 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0x2000000000000000]}, 0x10) [ 1352.007988] net_ratelimit: 1 callbacks suppressed [ 1352.008007] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1352.009913] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1352.026509] FAULT_INJECTION: forcing a failure. [ 1352.026509] name failslab, interval 1, probability 0, space 0, times 0 [ 1352.039789] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1352.054319] CPU: 1 PID: 3446 Comm: syz-executor3 Not tainted 4.19.0-rc6+ #269 [ 1352.061623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1352.070999] Call Trace: [ 1352.073605] dump_stack+0x1c4/0x2b4 [ 1352.077250] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1352.082453] should_fail.cold.4+0xa/0x17 [ 1352.086524] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1352.091631] ? save_stack+0x43/0xd0 [ 1352.095261] ? kasan_kmalloc+0xc7/0xe0 [ 1352.099151] ? kasan_slab_alloc+0x12/0x20 [ 1352.103302] ? kmem_cache_alloc+0x12e/0x730 [ 1352.107644] ? __d_alloc+0xc8/0xcc0 [ 1352.111268] ? d_alloc_pseudo+0x1d/0x30 [ 1352.115246] ? alloc_file_pseudo+0x158/0x3f0 [ 1352.120032] ? __shmem_file_setup.part.45+0x110/0x2a0 [ 1352.125234] ? __x64_sys_memfd_create+0x2af/0x4f0 [ 1352.130081] ? mark_held_locks+0x130/0x130 [ 1352.134329] ? percpu_ref_put_many+0x11c/0x260 [ 1352.138911] ? lock_downgrade+0x900/0x900 [ 1352.143062] ? lock_release+0x970/0x970 [ 1352.147036] ? memcg_kmem_get_cache+0x3a9/0x9d0 [ 1352.151711] ? fs_reclaim_acquire+0x20/0x20 [ 1352.156034] ? lock_downgrade+0x900/0x900 [ 1352.160187] ? ___might_sleep+0x1ed/0x300 [ 1352.164355] ? arch_local_save_flags+0x40/0x40 [ 1352.168939] ? lock_downgrade+0x900/0x900 [ 1352.173109] __should_failslab+0x124/0x180 [ 1352.177369] should_failslab+0x9/0x14 [ 1352.181188] kmem_cache_alloc+0x2be/0x730 [ 1352.185379] ? kasan_check_write+0x14/0x20 [ 1352.189612] ? do_raw_spin_lock+0xc1/0x200 [ 1352.193851] __alloc_file+0xa8/0x470 [ 1352.197572] ? file_free_rcu+0xd0/0xd0 [ 1352.201460] ? d_instantiate+0x79/0xa0 [ 1352.205354] ? lock_downgrade+0x900/0x900 [ 1352.209505] ? kasan_check_read+0x11/0x20 [ 1352.213650] ? do_raw_spin_unlock+0xa7/0x2f0 [ 1352.218057] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 1352.222641] alloc_empty_file+0x72/0x170 [ 1352.226706] alloc_file+0x5e/0x4d0 [ 1352.230260] ? _raw_spin_unlock+0x2c/0x50 [ 1352.234425] alloc_file_pseudo+0x261/0x3f0 [ 1352.238662] ? alloc_file+0x4d0/0x4d0 [ 1352.242465] ? usercopy_warn+0x110/0x110 [ 1352.246532] ? kasan_check_write+0x14/0x20 [ 1352.250780] __shmem_file_setup.part.45+0x110/0x2a0 [ 1352.255813] shmem_file_setup+0x65/0x90 [ 1352.259797] __x64_sys_memfd_create+0x2af/0x4f0 [ 1352.264473] ? memfd_fcntl+0x1230/0x1230 [ 1352.268559] do_syscall_64+0x1b9/0x820 [ 1352.272450] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1352.277817] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1352.282745] ? trace_hardirqs_on_caller+0x310/0x310 [ 1352.287760] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1352.292777] ? recalc_sigpending_tsk+0x180/0x180 [ 1352.297530] ? kasan_check_write+0x14/0x20 [ 1352.301772] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1352.306622] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1352.311822] RIP: 0033:0x457579 [ 1352.315024] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1352.333926] RSP: 002b:00007ff838176a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1352.341639] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000457579 [ 1352.348907] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc7c9 00:27:03 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x18020000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1352.356169] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1352.363435] R10: 0000000020000140 R11: 0000000000000246 R12: 00007ff8381776d4 [ 1352.370701] R13: 00000000004c4b77 R14: 00000000004d7ef0 R15: 0000000000000003 00:27:03 executing program 3 (fault-call:0 fault-nth:4): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") [ 1352.458625] FAULT_INJECTION: forcing a failure. [ 1352.458625] name failslab, interval 1, probability 0, space 0, times 0 [ 1352.470143] CPU: 0 PID: 3461 Comm: syz-executor3 Not tainted 4.19.0-rc6+ #269 [ 1352.477419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1352.486763] Call Trace: [ 1352.489339] dump_stack+0x1c4/0x2b4 [ 1352.492981] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1352.498186] ? lock_downgrade+0x900/0x900 [ 1352.502335] should_fail.cold.4+0xa/0x17 [ 1352.506391] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1352.511684] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1352.516792] ? is_bpf_text_address+0xd3/0x170 [ 1352.521463] ? kernel_text_address+0x79/0xf0 [ 1352.525883] ? __kernel_text_address+0xd/0x40 [ 1352.530380] ? unwind_get_return_address+0x61/0xa0 [ 1352.535313] ? __save_stack_trace+0x8d/0xf0 [ 1352.539641] ? fs_reclaim_acquire+0x20/0x20 [ 1352.543966] ? lock_downgrade+0x900/0x900 [ 1352.548112] ? kasan_slab_alloc+0x12/0x20 [ 1352.552263] ? ___might_sleep+0x1ed/0x300 [ 1352.556408] ? __x64_sys_memfd_create+0x2af/0x4f0 [ 1352.561251] ? arch_local_save_flags+0x40/0x40 [ 1352.565845] __should_failslab+0x124/0x180 [ 1352.570090] should_failslab+0x9/0x14 [ 1352.573892] kmem_cache_alloc_trace+0x2d7/0x750 [ 1352.578572] ? lock_downgrade+0x900/0x900 [ 1352.582727] apparmor_file_alloc_security+0x168/0xaa0 [ 1352.587915] ? percpu_ref_put_many+0x13e/0x260 [ 1352.592499] ? trace_hardirqs_on+0xbd/0x310 [ 1352.596844] ? mem_cgroup_charge_statistics+0x780/0x780 [ 1352.602228] ? apparmor_socket_getpeersec_stream+0xab0/0xab0 [ 1352.608032] ? kasan_kmalloc+0xc7/0xe0 [ 1352.611920] ? kasan_slab_alloc+0x12/0x20 [ 1352.616071] ? kmem_cache_alloc+0x306/0x730 [ 1352.620401] security_file_alloc+0x4c/0xa0 [ 1352.624637] __alloc_file+0x12a/0x470 [ 1352.628441] ? file_free_rcu+0xd0/0xd0 [ 1352.632335] ? d_instantiate+0x79/0xa0 [ 1352.636251] ? lock_downgrade+0x900/0x900 [ 1352.640402] ? kasan_check_read+0x11/0x20 [ 1352.644553] ? do_raw_spin_unlock+0xa7/0x2f0 [ 1352.648959] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 1352.653540] alloc_empty_file+0x72/0x170 [ 1352.657599] alloc_file+0x5e/0x4d0 [ 1352.661131] ? _raw_spin_unlock+0x2c/0x50 [ 1352.665281] alloc_file_pseudo+0x261/0x3f0 [ 1352.669514] ? alloc_file+0x4d0/0x4d0 [ 1352.673313] ? usercopy_warn+0x110/0x110 [ 1352.677374] ? kasan_check_write+0x14/0x20 [ 1352.681624] __shmem_file_setup.part.45+0x110/0x2a0 [ 1352.686644] shmem_file_setup+0x65/0x90 [ 1352.690619] __x64_sys_memfd_create+0x2af/0x4f0 [ 1352.695286] ? memfd_fcntl+0x1230/0x1230 [ 1352.699356] do_syscall_64+0x1b9/0x820 [ 1352.703246] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1352.708608] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1352.713540] ? trace_hardirqs_on_caller+0x310/0x310 [ 1352.718555] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1352.723580] ? recalc_sigpending_tsk+0x180/0x180 [ 1352.728350] ? kasan_check_write+0x14/0x20 [ 1352.732601] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1352.737487] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1352.742673] RIP: 0033:0x457579 00:27:03 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x734d040000000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:27:04 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x3000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1352.745867] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1352.764774] RSP: 002b:00007ff838176a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1352.772494] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000457579 [ 1352.779763] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc7c9 [ 1352.787030] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1352.794311] R10: 0000000020000140 R11: 0000000000000246 R12: 00007ff8381776d4 [ 1352.801577] R13: 00000000004c4b77 R14: 00000000004d7ef0 R15: 0000000000000003 00:27:04 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0xa000000]}, 0x10) 00:27:04 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x600, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:27:04 executing program 3 (fault-call:0 fault-nth:5): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") [ 1352.906427] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1352.930632] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1352.944407] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1352.981123] FAULT_INJECTION: forcing a failure. [ 1352.981123] name failslab, interval 1, probability 0, space 0, times 0 [ 1353.002021] CPU: 1 PID: 3479 Comm: syz-executor3 Not tainted 4.19.0-rc6+ #269 [ 1353.009349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1353.018715] Call Trace: [ 1353.021326] dump_stack+0x1c4/0x2b4 [ 1353.024993] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1353.030202] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1353.036031] should_fail.cold.4+0xa/0x17 [ 1353.040108] ? current_time+0x72/0x1b0 [ 1353.044017] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1353.049131] ? shmem_setattr+0x50e/0xda0 [ 1353.053198] ? lock_downgrade+0x900/0x900 [ 1353.057361] ? current_time+0x72/0x1b0 [ 1353.061256] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1353.066794] ? timespec64_trunc+0xea/0x180 [ 1353.071028] ? inode_init_owner+0x340/0x340 [ 1353.075359] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1353.080896] ? fsnotify+0xaae/0x12f0 [ 1353.084622] ? fs_reclaim_acquire+0x20/0x20 [ 1353.088950] ? lock_downgrade+0x900/0x900 [ 1353.093107] ? ___might_sleep+0x1ed/0x300 [ 1353.097262] ? arch_local_save_flags+0x40/0x40 [ 1353.101848] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1353.107393] __should_failslab+0x124/0x180 [ 1353.111629] should_failslab+0x9/0x14 [ 1353.115442] kmem_cache_alloc+0x2be/0x730 [ 1353.119595] ? do_sys_ftruncate+0x428/0x550 [ 1353.123924] ? lock_downgrade+0x900/0x900 [ 1353.128083] getname_flags+0xd0/0x5a0 [ 1353.131887] getname+0x19/0x20 [ 1353.135084] do_sys_open+0x383/0x700 [ 1353.138797] ? filp_open+0x80/0x80 [ 1353.142343] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1353.147797] ? do_sys_ftruncate+0x449/0x550 [ 1353.152120] __x64_sys_open+0x7e/0xc0 [ 1353.155941] do_syscall_64+0x1b9/0x820 [ 1353.159834] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1353.165212] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1353.170147] ? trace_hardirqs_on_caller+0x310/0x310 [ 1353.175170] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1353.180186] ? recalc_sigpending_tsk+0x180/0x180 [ 1353.184984] ? kasan_check_write+0x14/0x20 [ 1353.189230] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1353.194090] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1353.199280] RIP: 0033:0x4111d1 [ 1353.202486] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1353.221396] RSP: 002b:00007ff838176a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 00:27:04 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x18020000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1353.229116] RAX: ffffffffffffffda RBX: 0000000020000150 RCX: 00000000004111d1 [ 1353.236389] RDX: 00007ff838176afa RSI: 0000000000000002 RDI: 00007ff838176af0 [ 1353.243654] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1353.250917] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1353.258182] R13: 0000000000000000 R14: 00000000004d7ef0 R15: 0000000000000003 00:27:04 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xf401, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:27:04 executing program 3 (fault-call:0 fault-nth:6): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") [ 1353.381822] IPVS: ftp: loaded support on port[0] = 21 [ 1353.418952] FAULT_INJECTION: forcing a failure. [ 1353.418952] name failslab, interval 1, probability 0, space 0, times 0 [ 1353.432433] CPU: 0 PID: 3493 Comm: syz-executor3 Not tainted 4.19.0-rc6+ #269 [ 1353.439735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1353.449087] Call Trace: [ 1353.451668] dump_stack+0x1c4/0x2b4 [ 1353.455288] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1353.460475] ? mark_held_locks+0x130/0x130 [ 1353.464699] should_fail.cold.4+0xa/0x17 [ 1353.468748] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 1353.473491] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1353.478581] ? is_bpf_text_address+0xac/0x170 [ 1353.483067] ? lock_downgrade+0x900/0x900 [ 1353.487213] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1353.492999] ? kasan_check_read+0x11/0x20 [ 1353.497134] ? mark_held_locks+0x130/0x130 [ 1353.501357] ? fs_reclaim_acquire+0x20/0x20 [ 1353.505661] ? lock_downgrade+0x900/0x900 [ 1353.509795] ? ___might_sleep+0x1ed/0x300 [ 1353.513936] ? arch_local_save_flags+0x40/0x40 [ 1353.518504] ? mark_held_locks+0x130/0x130 [ 1353.522724] __should_failslab+0x124/0x180 [ 1353.526947] should_failslab+0x9/0x14 [ 1353.530739] kmem_cache_alloc+0x2be/0x730 [ 1353.534873] ? mark_held_locks+0x130/0x130 [ 1353.539091] ? __x64_sys_memfd_create+0x2af/0x4f0 [ 1353.543919] __alloc_file+0xa8/0x470 [ 1353.547618] ? file_free_rcu+0xd0/0xd0 [ 1353.551494] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1353.556497] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 1353.561243] ? is_bpf_text_address+0xac/0x170 [ 1353.565725] ? lock_downgrade+0x900/0x900 [ 1353.569858] alloc_empty_file+0x72/0x170 [ 1353.573915] path_openat+0x170/0x5160 [ 1353.577708] ? rcu_bh_qs+0xc0/0xc0 [ 1353.581236] ? unwind_dump+0x190/0x190 [ 1353.585126] ? is_bpf_text_address+0xd3/0x170 [ 1353.589615] ? kernel_text_address+0x79/0xf0 [ 1353.594024] ? path_lookupat.isra.43+0xc00/0xc00 [ 1353.598759] ? unwind_get_return_address+0x61/0xa0 [ 1353.603680] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1353.608683] ? expand_files.part.8+0x571/0x9a0 [ 1353.613252] ? iterate_fd+0x4b0/0x4b0 [ 1353.617042] ? __alloc_fd+0x347/0x6e0 [ 1353.620843] ? lock_downgrade+0x900/0x900 [ 1353.624987] ? getname+0x19/0x20 [ 1353.628338] ? kasan_check_read+0x11/0x20 [ 1353.632477] ? do_raw_spin_unlock+0xa7/0x2f0 [ 1353.636873] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 1353.641438] ? kasan_check_write+0x14/0x20 [ 1353.645657] ? do_raw_spin_lock+0xc1/0x200 [ 1353.649883] ? _raw_spin_unlock+0x2c/0x50 [ 1353.654026] ? __alloc_fd+0x347/0x6e0 [ 1353.657827] do_filp_open+0x255/0x380 [ 1353.661616] ? may_open_dev+0x100/0x100 [ 1353.665583] ? get_unused_fd_flags+0x122/0x1a0 [ 1353.670147] ? __alloc_fd+0x6e0/0x6e0 [ 1353.673943] do_sys_open+0x568/0x700 [ 1353.677642] ? filp_open+0x80/0x80 [ 1353.681169] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1353.686622] ? do_sys_ftruncate+0x449/0x550 [ 1353.690930] __x64_sys_open+0x7e/0xc0 [ 1353.694718] do_syscall_64+0x1b9/0x820 [ 1353.698589] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1353.703939] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1353.708852] ? trace_hardirqs_on_caller+0x310/0x310 [ 1353.713865] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1353.718883] ? recalc_sigpending_tsk+0x180/0x180 [ 1353.723622] ? kasan_check_write+0x14/0x20 [ 1353.727874] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1353.732711] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1353.737900] RIP: 0033:0x4111d1 [ 1353.741079] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1353.760003] RSP: 002b:00007ff838176a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 00:27:04 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x54550100, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:27:05 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x3000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1353.767702] RAX: ffffffffffffffda RBX: 0000000020000150 RCX: 00000000004111d1 [ 1353.774957] RDX: 00007ff838176afa RSI: 0000000000000002 RDI: 00007ff838176af0 [ 1353.782234] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1353.789491] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1353.796747] R13: 0000000000000000 R14: 00000000004d7ef0 R15: 0000000000000003 00:27:05 executing program 3 (fault-call:0 fault-nth:7): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:27:05 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0xa00000000000000]}, 0x10) [ 1353.855800] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:27:05 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xb6d3b6420010000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1353.956618] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1353.983750] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1354.012619] FAULT_INJECTION: forcing a failure. [ 1354.012619] name failslab, interval 1, probability 0, space 0, times 0 [ 1354.024039] CPU: 1 PID: 3518 Comm: syz-executor3 Not tainted 4.19.0-rc6+ #269 [ 1354.031327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1354.040693] Call Trace: [ 1354.043313] dump_stack+0x1c4/0x2b4 [ 1354.046984] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1354.052200] ? lock_downgrade+0x900/0x900 [ 1354.056391] should_fail.cold.4+0xa/0x17 [ 1354.060469] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1354.065767] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1354.070893] ? is_bpf_text_address+0xd3/0x170 [ 1354.075404] ? kernel_text_address+0x79/0xf0 [ 1354.079827] ? __kernel_text_address+0xd/0x40 [ 1354.084336] ? unwind_get_return_address+0x61/0xa0 [ 1354.089285] ? __save_stack_trace+0x8d/0xf0 [ 1354.093630] ? fs_reclaim_acquire+0x20/0x20 [ 1354.097965] ? lock_downgrade+0x900/0x900 [ 1354.102135] ? kasan_slab_alloc+0x12/0x20 [ 1354.106300] ? ___might_sleep+0x1ed/0x300 [ 1354.110464] ? do_syscall_64+0x1b9/0x820 [ 1354.114539] ? arch_local_save_flags+0x40/0x40 [ 1354.119139] __should_failslab+0x124/0x180 [ 1354.123874] should_failslab+0x9/0x14 [ 1354.127693] kmem_cache_alloc_trace+0x2d7/0x750 [ 1354.132380] ? lock_downgrade+0x900/0x900 [ 1354.136547] apparmor_file_alloc_security+0x168/0xaa0 [ 1354.141751] ? percpu_ref_put_many+0x13e/0x260 [ 1354.146344] ? trace_hardirqs_on+0xbd/0x310 [ 1354.150677] ? mem_cgroup_charge_statistics+0x780/0x780 [ 1354.156061] ? apparmor_socket_getpeersec_stream+0xab0/0xab0 [ 1354.161867] ? kasan_kmalloc+0xc7/0xe0 [ 1354.165770] ? kasan_slab_alloc+0x12/0x20 [ 1354.169936] ? kmem_cache_alloc+0x306/0x730 [ 1354.174288] security_file_alloc+0x4c/0xa0 [ 1354.178536] __alloc_file+0x12a/0x470 [ 1354.182354] ? file_free_rcu+0xd0/0xd0 [ 1354.186259] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1354.191280] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 1354.196025] ? is_bpf_text_address+0xac/0x170 [ 1354.200510] ? lock_downgrade+0x900/0x900 [ 1354.204647] alloc_empty_file+0x72/0x170 [ 1354.208706] path_openat+0x170/0x5160 [ 1354.212516] ? rcu_bh_qs+0xc0/0xc0 [ 1354.216043] ? unwind_dump+0x190/0x190 [ 1354.219938] ? is_bpf_text_address+0xd3/0x170 [ 1354.224458] ? kernel_text_address+0x79/0xf0 [ 1354.228893] ? path_lookupat.isra.43+0xc00/0xc00 [ 1354.233676] ? unwind_get_return_address+0x61/0xa0 [ 1354.238597] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1354.243601] ? expand_files.part.8+0x571/0x9a0 [ 1354.248173] ? iterate_fd+0x4b0/0x4b0 [ 1354.251962] ? __alloc_fd+0x347/0x6e0 [ 1354.255768] ? lock_downgrade+0x900/0x900 [ 1354.259916] ? getname+0x19/0x20 [ 1354.263320] ? kasan_check_read+0x11/0x20 [ 1354.267485] ? do_raw_spin_unlock+0xa7/0x2f0 [ 1354.271905] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 1354.276488] ? kasan_check_write+0x14/0x20 [ 1354.280718] ? do_raw_spin_lock+0xc1/0x200 [ 1354.284965] ? _raw_spin_unlock+0x2c/0x50 [ 1354.289131] ? __alloc_fd+0x347/0x6e0 [ 1354.292944] do_filp_open+0x255/0x380 [ 1354.296750] ? may_open_dev+0x100/0x100 [ 1354.300731] ? get_unused_fd_flags+0x122/0x1a0 [ 1354.305321] ? __alloc_fd+0x6e0/0x6e0 [ 1354.309120] do_sys_open+0x568/0x700 [ 1354.312843] ? filp_open+0x80/0x80 [ 1354.316390] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1354.321830] ? do_sys_ftruncate+0x449/0x550 [ 1354.326156] __x64_sys_open+0x7e/0xc0 [ 1354.329950] do_syscall_64+0x1b9/0x820 [ 1354.333847] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1354.339255] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1354.344176] ? trace_hardirqs_on_caller+0x310/0x310 [ 1354.349182] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1354.354192] ? recalc_sigpending_tsk+0x180/0x180 [ 1354.358952] ? kasan_check_write+0x14/0x20 [ 1354.363199] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1354.368042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1354.373229] RIP: 0033:0x4111d1 [ 1354.376420] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1354.395327] RSP: 002b:00007ff838176a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1354.403020] RAX: ffffffffffffffda RBX: 0000000020000150 RCX: 00000000004111d1 00:27:05 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xf5010000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1354.410275] RDX: 00007ff838176afa RSI: 0000000000000002 RDI: 00007ff838176af0 [ 1354.417527] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1354.424780] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1354.432031] R13: 0000000000000000 R14: 00000000004d7ef0 R15: 0000000000000003 [ 1354.446888] device bridge_slave_1 left promiscuous mode [ 1354.452362] bridge0: port 2(bridge_slave_1) entered disabled state [ 1354.497168] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1354.510170] device bridge_slave_0 left promiscuous mode [ 1354.515867] bridge0: port 1(bridge_slave_0) entered disabled state [ 1354.572105] team0 (unregistering): Port device team_slave_1 removed [ 1354.581726] team0 (unregistering): Port device team_slave_0 removed [ 1354.591551] bond0 (unregistering): Releasing backup interface bond_slave_1 00:27:05 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xfffffff5, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1354.627868] bond0 (unregistering): Releasing backup interface bond_slave_0 00:27:05 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x3000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:27:05 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x3ea, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1354.731628] bond0 (unregistering): Released all slaves [ 1355.268311] bridge0: port 1(bridge_slave_0) entered blocking state [ 1355.275089] bridge0: port 1(bridge_slave_0) entered disabled state [ 1355.282402] device bridge_slave_0 entered promiscuous mode [ 1355.322602] bridge0: port 2(bridge_slave_1) entered blocking state [ 1355.329222] bridge0: port 2(bridge_slave_1) entered disabled state [ 1355.336891] device bridge_slave_1 entered promiscuous mode [ 1355.376352] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1355.414886] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1355.491940] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1355.546084] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1355.660821] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1355.668068] team0: Port device team_slave_0 added [ 1355.690214] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1355.697325] team0: Port device team_slave_1 added [ 1355.719189] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1355.744149] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1355.768088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1355.793044] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1355.994256] bridge0: port 2(bridge_slave_1) entered blocking state [ 1356.000616] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1356.007299] bridge0: port 1(bridge_slave_0) entered blocking state [ 1356.013637] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1356.021012] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1356.735606] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1356.806910] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1356.843928] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1356.886975] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1356.893078] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1356.900370] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1356.969889] 8021q: adding VLAN 0 to HW filter on device team0 00:27:08 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000380)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'lo\x00'}, 0x18) ioctl(r2, 0x800000000008982, &(0x7f0000000000)) preadv(r0, &(0x7f0000000540)=[{&(0x7f00000005c0)=""/243, 0xf3}], 0x1, 0x0) close(r1) socket$packet(0x11, 0x3, 0x300) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f00000001c0)={'broute\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f0000000100)=[{}], 0x0, [{}]}, 0x88) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000180)={0x0, r1}) 00:27:08 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0x7000000]}, 0x10) 00:27:08 executing program 3 (fault-call:0 fault-nth:8): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:27:08 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xffffffff00000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:27:08 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xf401000000000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:27:08 executing program 5: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000200)=""/55, 0x37) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0x8008ae9d, &(0x7f0000000040)=""/193) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r2, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x408c0, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents(r0, &(0x7f0000000240)=""/153, 0x99) [ 1357.411186] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1357.422490] FAULT_INJECTION: forcing a failure. [ 1357.422490] name failslab, interval 1, probability 0, space 0, times 0 [ 1357.427254] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1357.451014] audit: type=1804 audit(1538785628.617:1018): pid=3801 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir438316190/syzkaller.2tB7ox/2064/bus" dev="sda1" ino=16574 res=1 [ 1357.478455] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1357.483580] CPU: 1 PID: 3804 Comm: syz-executor3 Not tainted 4.19.0-rc6+ #269 [ 1357.492437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1357.501793] Call Trace: [ 1357.504408] dump_stack+0x1c4/0x2b4 [ 1357.508058] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1357.513265] ? mark_held_locks+0x130/0x130 [ 1357.517520] should_fail.cold.4+0xa/0x17 [ 1357.521597] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1357.526709] ? up_read+0x110/0x110 [ 1357.530261] ? down_read+0x1d0/0x1d0 [ 1357.534001] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1357.539550] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1357.545103] ? lock_acquire+0x1ed/0x520 [ 1357.549096] ? lo_ioctl+0x8e/0x1d80 [ 1357.552739] ? lock_release+0x970/0x970 [ 1357.556727] ? arch_local_save_flags+0x40/0x40 [ 1357.561342] ? fs_reclaim_acquire+0x20/0x20 [ 1357.565679] ? lock_downgrade+0x900/0x900 [ 1357.569844] ? ___might_sleep+0x1ed/0x300 [ 1357.574007] ? arch_local_save_flags+0x40/0x40 [ 1357.578610] __should_failslab+0x124/0x180 [ 1357.582858] should_failslab+0x9/0x14 [ 1357.586674] kmem_cache_alloc_trace+0x2d7/0x750 [ 1357.591368] __kthread_create_on_node+0x137/0x540 [ 1357.596239] ? loop_get_status64+0x140/0x140 [ 1357.600660] ? __kthread_parkme+0x1a0/0x1a0 [ 1357.605010] ? ksys_dup3+0x680/0x680 [ 1357.608739] ? __lockdep_init_map+0x105/0x590 [ 1357.613248] ? __lockdep_init_map+0x105/0x590 [ 1357.617763] ? loop_get_status64+0x140/0x140 [ 1357.622186] kthread_create_on_node+0xb1/0xe0 [ 1357.626707] ? __kthread_create_on_node+0x540/0x540 [ 1357.631737] ? kasan_check_read+0x11/0x20 [ 1357.635905] lo_ioctl+0x7f6/0x1d80 [ 1357.639462] ? lo_rw_aio_complete+0x470/0x470 [ 1357.643981] blkdev_ioctl+0x9ac/0x2010 [ 1357.647905] ? blkpg_ioctl+0xc10/0xc10 [ 1357.651807] ? lock_downgrade+0x900/0x900 [ 1357.655980] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1357.661793] ? save_stack+0x43/0xd0 [ 1357.665432] ? __kasan_slab_free+0x102/0x150 [ 1357.665453] ? __fget+0x4d1/0x740 [ 1357.665472] ? ksys_dup3+0x680/0x680 [ 1357.673327] ? kasan_check_write+0x14/0x20 [ 1357.673353] block_ioctl+0xee/0x130 [ 1357.684908] ? blkdev_fallocate+0x400/0x400 [ 1357.689252] do_vfs_ioctl+0x1de/0x1720 [ 1357.693154] ? trace_hardirqs_on+0xbd/0x310 [ 1357.697488] ? ioctl_preallocate+0x300/0x300 [ 1357.701908] ? __fget_light+0x2e9/0x430 [ 1357.705888] ? fget_raw+0x20/0x20 [ 1357.709352] ? putname+0xf2/0x130 00:27:08 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x400, 0x0) getresuid(&(0x7f0000000100)=0x0, &(0x7f0000000140), &(0x7f0000000180)) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r3, &(0x7f0000000080)='./file0\x00', r4, r5, 0xc00) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x77, 0x0, [0x4b564d02, 0x1, 0x259]}) 00:27:08 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x8d88349499000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1357.712818] ? kmem_cache_free+0x21a/0x290 [ 1357.717060] ? putname+0xf7/0x130 [ 1357.720525] ? do_sys_open+0x3ac/0x700 [ 1357.724427] ? security_file_ioctl+0x94/0xc0 [ 1357.728852] ksys_ioctl+0xa9/0xd0 [ 1357.732320] __x64_sys_ioctl+0x73/0xb0 [ 1357.736228] do_syscall_64+0x1b9/0x820 [ 1357.740133] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1357.745513] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1357.750460] ? trace_hardirqs_on_caller+0x310/0x310 [ 1357.755499] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1357.760530] ? recalc_sigpending_tsk+0x180/0x180 [ 1357.764897] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1357.765294] ? kasan_check_write+0x14/0x20 [ 1357.765315] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1357.765338] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1357.765356] RIP: 0033:0x4573e7 [ 1357.793097] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:27:09 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x420000, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r2, 0x54a1) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r4, &(0x7f0000000000)=[{&(0x7f0000003640)=""/4096, 0x1774}], 0xa, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0xf7, 0x0) [ 1357.812006] RSP: 002b:00007ff838176a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1357.819726] RAX: ffffffffffffffda RBX: 0000000020000150 RCX: 00000000004573e7 [ 1357.827001] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1357.834280] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1357.841554] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1357.848832] R13: 0000000000000000 R14: 00000000004d7ef0 R15: 0000000000000003 00:27:09 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x600, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:27:09 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x80000200fd, 0x0) r2 = socket$inet6(0xa, 0x4000000080003, 0x800000000000006) socket$inet6_sctp(0xa, 0x1, 0x84) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f0000000180)=0x6) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000040)={'L+', 0x10000}, 0x28, 0x2) ioctl(r0, 0x0, &(0x7f0000000440)="80036f2482094a98eb512d1f3402def45d7008ad168c1a1d4819e3d5f39dec686aac07c881020f3d521efb176c57754ca0f7ea227ed022af8a0200000000000000f5000000000c029bb2d2421db5443c98a7003f0000000000000400") write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x45, 0x400000002}], 0xf6) 00:27:09 executing program 3 (fault-call:0 fault-nth:9): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") [ 1358.001960] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1358.034397] FAULT_INJECTION: forcing a failure. [ 1358.034397] name failslab, interval 1, probability 0, space 0, times 0 00:27:09 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x1, &(0x7f0000000040)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x24000, 0x0) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000000300)={0x0, 0x0, 0x2080}) chmod(&(0x7f0000000080)='./file0\x00', 0x0) [ 1358.063962] CPU: 1 PID: 3837 Comm: syz-executor3 Not tainted 4.19.0-rc6+ #269 [ 1358.071274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1358.080635] Call Trace: [ 1358.083263] dump_stack+0x1c4/0x2b4 [ 1358.086917] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1358.092125] ? mark_held_locks+0x130/0x130 [ 1358.096382] should_fail.cold.4+0xa/0x17 [ 1358.100464] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1358.105580] ? up_read+0x110/0x110 [ 1358.109130] ? down_read+0x1d0/0x1d0 [ 1358.112861] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1358.118414] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1358.124478] ? lock_acquire+0x1ed/0x520 [ 1358.129009] ? lo_ioctl+0x8e/0x1d80 [ 1358.132654] ? lock_release+0x970/0x970 [ 1358.136645] ? arch_local_save_flags+0x40/0x40 [ 1358.141257] ? fs_reclaim_acquire+0x20/0x20 [ 1358.145591] ? lock_downgrade+0x900/0x900 [ 1358.149755] ? ___might_sleep+0x1ed/0x300 [ 1358.153912] ? arch_local_save_flags+0x40/0x40 [ 1358.158516] __should_failslab+0x124/0x180 [ 1358.162754] should_failslab+0x9/0x14 [ 1358.166562] kmem_cache_alloc_trace+0x2d7/0x750 [ 1358.171246] __kthread_create_on_node+0x137/0x540 [ 1358.176093] ? loop_get_status64+0x140/0x140 [ 1358.180503] ? __kthread_parkme+0x1a0/0x1a0 [ 1358.184840] ? ksys_dup3+0x680/0x680 [ 1358.188553] ? __lockdep_init_map+0x105/0x590 [ 1358.193052] ? __lockdep_init_map+0x105/0x590 [ 1358.197552] ? loop_get_status64+0x140/0x140 [ 1358.201961] kthread_create_on_node+0xb1/0xe0 [ 1358.206467] ? __kthread_create_on_node+0x540/0x540 [ 1358.211492] ? kasan_check_read+0x11/0x20 [ 1358.215648] lo_ioctl+0x7f6/0x1d80 [ 1358.219195] ? lo_rw_aio_complete+0x470/0x470 [ 1358.223701] blkdev_ioctl+0x9ac/0x2010 [ 1358.227593] ? blkpg_ioctl+0xc10/0xc10 [ 1358.231476] ? lock_downgrade+0x900/0x900 [ 1358.235631] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1358.241433] ? save_stack+0x43/0xd0 [ 1358.245057] ? __kasan_slab_free+0x102/0x150 [ 1358.249467] ? __fget+0x4d1/0x740 [ 1358.252925] ? ksys_dup3+0x680/0x680 [ 1358.256640] ? kasan_check_write+0x14/0x20 [ 1358.260885] block_ioctl+0xee/0x130 [ 1358.264514] ? blkdev_fallocate+0x400/0x400 [ 1358.268840] do_vfs_ioctl+0x1de/0x1720 [ 1358.272732] ? trace_hardirqs_on+0xbd/0x310 [ 1358.277057] ? ioctl_preallocate+0x300/0x300 [ 1358.281641] ? __fget_light+0x2e9/0x430 [ 1358.285616] ? fget_raw+0x20/0x20 [ 1358.289070] ? putname+0xf2/0x130 [ 1358.292524] ? kmem_cache_free+0x21a/0x290 [ 1358.296758] ? putname+0xf7/0x130 [ 1358.300224] ? do_sys_open+0x3ac/0x700 [ 1358.304120] ? security_file_ioctl+0x94/0xc0 [ 1358.308533] ksys_ioctl+0xa9/0xd0 [ 1358.311990] __x64_sys_ioctl+0x73/0xb0 [ 1358.315882] do_syscall_64+0x1b9/0x820 [ 1358.319772] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1358.325138] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1358.330068] ? trace_hardirqs_on_caller+0x310/0x310 [ 1358.335087] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1358.340103] ? recalc_sigpending_tsk+0x180/0x180 [ 1358.345034] ? kasan_check_write+0x14/0x20 [ 1358.349274] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1358.354125] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1358.359314] RIP: 0033:0x4573e7 [ 1358.362508] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1358.381408] RSP: 002b:00007ff838176a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1358.389116] RAX: ffffffffffffffda RBX: 0000000020000150 RCX: 00000000004573e7 [ 1358.396383] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1358.403668] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 00:27:09 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0x6000000]}, 0x10) 00:27:09 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x2000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1358.410932] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1358.418209] R13: 0000000000000000 R14: 00000000004d7ef0 R15: 0000000000000003 [ 1358.441017] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 00:27:09 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x929, &(0x7f0000000000)) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x4ab0, 0x300) socket$l2tp(0x18, 0x1, 0x1) getsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f00000000c0)=""/158, &(0x7f0000000180)=0x9e) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) 00:27:09 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x8, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:27:09 executing program 3 (fault-call:0 fault-nth:10): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") [ 1358.517510] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1358.538141] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1358.617999] FAULT_INJECTION: forcing a failure. [ 1358.617999] name failslab, interval 1, probability 0, space 0, times 0 [ 1358.630182] CPU: 1 PID: 3860 Comm: syz-executor3 Not tainted 4.19.0-rc6+ #269 [ 1358.637482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1358.637489] Call Trace: [ 1358.637527] dump_stack+0x1c4/0x2b4 [ 1358.653082] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1358.658290] ? mark_held_locks+0x130/0x130 [ 1358.659611] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1358.662545] should_fail.cold.4+0xa/0x17 [ 1358.662570] ? mark_held_locks+0x130/0x130 [ 1358.681155] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1358.686265] ? is_bpf_text_address+0xac/0x170 [ 1358.690767] ? pick_next_entity+0x197/0x390 [ 1358.695092] ? pick_next_task_fair+0x98e/0x17c0 [ 1358.699787] ? rcu_bh_qs+0xc0/0xc0 [ 1358.703333] ? update_curr+0x200/0xbe0 [ 1358.707238] ? fs_reclaim_acquire+0x20/0x20 [ 1358.711564] ? lock_downgrade+0x900/0x900 [ 1358.715718] ? ___might_sleep+0x1ed/0x300 [ 1358.719869] ? arch_local_save_flags+0x40/0x40 [ 1358.724461] ? __enqueue_entity+0x10d/0x1f0 [ 1358.728792] __should_failslab+0x124/0x180 [ 1358.733032] should_failslab+0x9/0x14 [ 1358.736834] kmem_cache_alloc+0x2be/0x730 [ 1358.740992] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1358.746015] __kernfs_new_node+0x127/0x8d0 [ 1358.750257] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1358.755707] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1358.760473] ? _raw_spin_unlock_irq+0x60/0x80 [ 1358.764979] ? __schedule+0x150b/0x1ed0 [ 1358.768960] ? __sched_text_start+0x8/0x8 [ 1358.773116] ? trace_hardirqs_on+0xbd/0x310 [ 1358.777435] ? kasan_check_read+0x11/0x20 [ 1358.781592] ? dequeue_task_fair+0xf9/0x9a0 [ 1358.785918] kernfs_new_node+0x95/0x120 [ 1358.789896] kernfs_create_dir_ns+0x4d/0x160 [ 1358.794309] internal_create_group+0x5fc/0xd80 [ 1358.798902] ? remove_files.isra.1+0x190/0x190 [ 1358.803486] ? up_write+0x7b/0x220 [ 1358.807028] ? up_read+0x110/0x110 [ 1358.810568] ? down_read+0x1d0/0x1d0 [ 1358.814282] ? kasan_check_write+0x14/0x20 [ 1358.818525] sysfs_create_group+0x1f/0x30 [ 1358.822674] lo_ioctl+0x1310/0x1d80 [ 1358.826306] ? lo_rw_aio_complete+0x470/0x470 [ 1358.830804] blkdev_ioctl+0x9ac/0x2010 [ 1358.834695] ? blkpg_ioctl+0xc10/0xc10 [ 1358.838580] ? lock_downgrade+0x900/0x900 [ 1358.842732] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1358.848532] ? save_stack+0x43/0xd0 [ 1358.852157] ? __kasan_slab_free+0x102/0x150 [ 1358.856569] ? __fget+0x4d1/0x740 [ 1358.860029] ? ksys_dup3+0x680/0x680 [ 1358.863744] ? trace_hardirqs_off+0x310/0x310 [ 1358.868240] ? kasan_check_write+0x14/0x20 [ 1358.872481] block_ioctl+0xee/0x130 [ 1358.876111] ? blkdev_fallocate+0x400/0x400 [ 1358.880440] do_vfs_ioctl+0x1de/0x1720 [ 1358.884331] ? retint_kernel+0x2d/0x2d [ 1358.888227] ? ioctl_preallocate+0x300/0x300 [ 1358.892638] ? __fget_light+0x2e9/0x430 [ 1358.896614] ? fget_raw+0x20/0x20 [ 1358.900075] ? kmem_cache_free+0x21a/0x290 [ 1358.904337] ? putname+0xf7/0x130 [ 1358.907796] ? do_sys_open+0x3ac/0x700 [ 1358.911688] ? security_file_ioctl+0x94/0xc0 [ 1358.916104] ksys_ioctl+0xa9/0xd0 [ 1358.919558] __x64_sys_ioctl+0x73/0xb0 [ 1358.923452] do_syscall_64+0x1b9/0x820 [ 1358.927346] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1358.932714] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1358.937649] ? trace_hardirqs_on_caller+0x310/0x310 [ 1358.942665] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1358.947682] ? recalc_sigpending_tsk+0x180/0x180 [ 1358.952435] ? kasan_check_write+0x14/0x20 [ 1358.956681] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1358.961534] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1358.966724] RIP: 0033:0x4573e7 [ 1358.969918] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1358.988815] RSP: 002b:00007ff838176a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1358.996524] RAX: ffffffffffffffda RBX: 0000000020000150 RCX: 00000000004573e7 [ 1359.003790] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1359.011057] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 00:27:10 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x600, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1359.018322] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1359.025589] R13: 0000000000000000 R14: 00000000004d7ef0 R15: 0000000000000003 [ 1359.066688] IPVS: ftp: loaded support on port[0] = 21 [ 1359.118353] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] 00:27:10 executing program 3 (fault-call:0 fault-nth:11): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") [ 1359.262771] FAULT_INJECTION: forcing a failure. [ 1359.262771] name failslab, interval 1, probability 0, space 0, times 0 [ 1359.289316] CPU: 1 PID: 3876 Comm: syz-executor3 Not tainted 4.19.0-rc6+ #269 [ 1359.296615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1359.305986] Call Trace: [ 1359.308590] dump_stack+0x1c4/0x2b4 [ 1359.312248] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1359.317478] should_fail.cold.4+0xa/0x17 [ 1359.321559] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1359.327114] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1359.332238] ? lock_acquire+0x1ed/0x520 [ 1359.336249] ? kernfs_activate+0x8e/0x2c0 [ 1359.340398] ? lock_release+0x970/0x970 [ 1359.344356] ? arch_local_save_flags+0x40/0x40 [ 1359.348936] ? fs_reclaim_acquire+0x20/0x20 [ 1359.353239] ? lock_downgrade+0x900/0x900 [ 1359.357377] ? ___might_sleep+0x1ed/0x300 [ 1359.361512] ? arch_local_save_flags+0x40/0x40 [ 1359.366102] __should_failslab+0x124/0x180 [ 1359.370346] should_failslab+0x9/0x14 [ 1359.374170] kmem_cache_alloc+0x2be/0x730 [ 1359.378347] ? kasan_check_read+0x11/0x20 [ 1359.382509] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1359.387540] __kernfs_new_node+0x127/0x8d0 [ 1359.391786] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1359.396549] ? kasan_check_write+0x14/0x20 [ 1359.400793] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1359.405726] ? __kernfs_new_node+0x697/0x8d0 [ 1359.410160] ? wait_for_completion+0x8a0/0x8a0 [ 1359.414756] ? kasan_check_write+0x14/0x20 [ 1359.419004] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1359.423943] ? _raw_spin_unlock_irq+0x60/0x80 [ 1359.428457] ? __schedule+0x150b/0x1ed0 [ 1359.432448] ? wait_for_completion+0x8a0/0x8a0 [ 1359.437064] ? mutex_unlock+0xd/0x10 [ 1359.440788] ? kernfs_activate+0x21a/0x2c0 [ 1359.445029] kernfs_new_node+0x95/0x120 [ 1359.449013] __kernfs_create_file+0x5a/0x340 [ 1359.453434] sysfs_add_file_mode_ns+0x222/0x530 [ 1359.458124] internal_create_group+0x3df/0xd80 [ 1359.462725] ? remove_files.isra.1+0x190/0x190 [ 1359.467313] ? up_write+0x7b/0x220 [ 1359.470859] ? up_read+0x110/0x110 [ 1359.474406] ? down_read+0x1d0/0x1d0 [ 1359.478128] ? kasan_check_write+0x14/0x20 [ 1359.482382] sysfs_create_group+0x1f/0x30 [ 1359.486543] lo_ioctl+0x1310/0x1d80 [ 1359.490184] ? lo_rw_aio_complete+0x470/0x470 [ 1359.494698] blkdev_ioctl+0x9ac/0x2010 [ 1359.498601] ? blkpg_ioctl+0xc10/0xc10 [ 1359.502495] ? lock_downgrade+0x900/0x900 [ 1359.506654] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1359.512468] ? save_stack+0x43/0xd0 [ 1359.516103] ? __kasan_slab_free+0x102/0x150 [ 1359.520538] ? __fget+0x4d1/0x740 [ 1359.524007] ? ksys_dup3+0x680/0x680 [ 1359.527724] ? kasan_check_write+0x14/0x20 [ 1359.531980] block_ioctl+0xee/0x130 [ 1359.535617] ? blkdev_fallocate+0x400/0x400 [ 1359.539950] do_vfs_ioctl+0x1de/0x1720 [ 1359.543873] ? trace_hardirqs_on+0xbd/0x310 [ 1359.548221] ? ioctl_preallocate+0x300/0x300 [ 1359.552641] ? __fget_light+0x2e9/0x430 [ 1359.556618] ? fget_raw+0x20/0x20 [ 1359.560078] ? putname+0xf2/0x130 [ 1359.563546] ? kmem_cache_free+0x21a/0x290 [ 1359.567790] ? putname+0xf7/0x130 [ 1359.571268] ? do_sys_open+0x3ac/0x700 [ 1359.575167] ? security_file_ioctl+0x94/0xc0 [ 1359.575185] ksys_ioctl+0xa9/0xd0 [ 1359.575215] __x64_sys_ioctl+0x73/0xb0 [ 1359.575234] do_syscall_64+0x1b9/0x820 [ 1359.575256] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1359.583112] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1359.590867] ? trace_hardirqs_on_caller+0x310/0x310 [ 1359.590889] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1359.601162] ? recalc_sigpending_tsk+0x180/0x180 [ 1359.601177] ? kasan_check_write+0x14/0x20 [ 1359.601197] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1359.611258] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1359.611278] RIP: 0033:0x4573e7 [ 1359.620322] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1359.630321] RSP: 002b:00007ff838176a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 00:27:10 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0x3f000000]}, 0x10) [ 1359.630337] RAX: ffffffffffffffda RBX: 0000000020000150 RCX: 00000000004573e7 [ 1359.630345] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1359.630354] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1359.630362] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1359.630369] R13: 0000000000000000 R14: 00000000004d7ef0 R15: 0000000000000003 00:27:10 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x54000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1359.722278] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1359.730094] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] 00:27:10 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x2000000000000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:27:11 executing program 3 (fault-call:0 fault-nth:12): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") [ 1359.835305] device bridge_slave_1 left promiscuous mode [ 1359.840954] bridge0: port 2(bridge_slave_1) entered disabled state [ 1359.881946] FAULT_INJECTION: forcing a failure. [ 1359.881946] name failslab, interval 1, probability 0, space 0, times 0 [ 1359.895010] device bridge_slave_0 left promiscuous mode [ 1359.907108] bridge0: port 1(bridge_slave_0) entered disabled state [ 1359.917401] CPU: 1 PID: 3914 Comm: syz-executor3 Not tainted 4.19.0-rc6+ #269 [ 1359.924696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1359.934058] Call Trace: [ 1359.936673] dump_stack+0x1c4/0x2b4 [ 1359.940327] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1359.945535] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1359.951083] ? replace_slot+0x151/0x520 [ 1359.955072] should_fail.cold.4+0xa/0x17 [ 1359.959146] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1359.964272] ? lock_release+0x970/0x970 [ 1359.968259] ? arch_local_save_flags+0x40/0x40 [ 1359.972861] ? __mutex_lock+0x85e/0x1700 [ 1359.976920] ? kernfs_activate+0x8e/0x2c0 [ 1359.981070] ? fs_reclaim_acquire+0x20/0x20 [ 1359.985375] ? lock_downgrade+0x900/0x900 [ 1359.989542] ? __mutex_lock+0x85e/0x1700 [ 1359.993601] ? ___might_sleep+0x1ed/0x300 [ 1359.997734] ? arch_local_save_flags+0x40/0x40 [ 1360.002324] ? kernfs_activate+0x21a/0x2c0 [ 1360.006577] __should_failslab+0x124/0x180 [ 1360.010826] should_failslab+0x9/0x14 [ 1360.014851] kmem_cache_alloc+0x2be/0x730 [ 1360.019001] ? lock_downgrade+0x900/0x900 [ 1360.023134] ? do_raw_spin_lock+0xc1/0x200 [ 1360.027477] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1360.032493] __kernfs_new_node+0x127/0x8d0 [ 1360.036715] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1360.041475] ? kasan_check_write+0x14/0x20 [ 1360.045701] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1360.050616] ? wait_for_completion+0x8a0/0x8a0 [ 1360.055197] ? wait_for_completion+0x8a0/0x8a0 [ 1360.059773] ? kasan_check_write+0x14/0x20 [ 1360.064008] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1360.068989] ? mutex_unlock+0xd/0x10 [ 1360.072691] ? kernfs_activate+0x21a/0x2c0 [ 1360.076910] ? kernfs_walk_and_get_ns+0x340/0x340 [ 1360.081747] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1360.087291] ? kernfs_link_sibling+0x1d2/0x3b0 [ 1360.091884] kernfs_new_node+0x95/0x120 [ 1360.095859] __kernfs_create_file+0x5a/0x340 [ 1360.100254] sysfs_add_file_mode_ns+0x222/0x530 [ 1360.104911] internal_create_group+0x3df/0xd80 [ 1360.109499] ? remove_files.isra.1+0x190/0x190 [ 1360.114086] ? up_write+0x7b/0x220 [ 1360.117608] ? up_read+0x110/0x110 [ 1360.121134] ? down_read+0x1d0/0x1d0 [ 1360.124830] ? kasan_check_write+0x14/0x20 [ 1360.129065] sysfs_create_group+0x1f/0x30 [ 1360.133225] lo_ioctl+0x1310/0x1d80 [ 1360.136867] ? lo_rw_aio_complete+0x470/0x470 [ 1360.141362] blkdev_ioctl+0x9ac/0x2010 [ 1360.145262] ? blkpg_ioctl+0xc10/0xc10 [ 1360.149140] ? lock_downgrade+0x900/0x900 [ 1360.153277] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1360.159061] ? save_stack+0x43/0xd0 [ 1360.162671] ? __kasan_slab_free+0x102/0x150 [ 1360.167068] ? __fget+0x4d1/0x740 [ 1360.170507] ? ksys_dup3+0x680/0x680 [ 1360.174213] ? kasan_check_write+0x14/0x20 [ 1360.178438] block_ioctl+0xee/0x130 [ 1360.182051] ? blkdev_fallocate+0x400/0x400 [ 1360.186368] do_vfs_ioctl+0x1de/0x1720 [ 1360.190252] ? trace_hardirqs_on+0xbd/0x310 [ 1360.194595] ? ioctl_preallocate+0x300/0x300 [ 1360.198992] ? __fget_light+0x2e9/0x430 [ 1360.203051] ? fget_raw+0x20/0x20 [ 1360.206502] ? putname+0xf2/0x130 [ 1360.209942] ? kmem_cache_free+0x21a/0x290 [ 1360.214186] ? putname+0xf7/0x130 [ 1360.217684] ? do_sys_open+0x3ac/0x700 [ 1360.221567] ? security_file_ioctl+0x94/0xc0 [ 1360.225969] ksys_ioctl+0xa9/0xd0 [ 1360.229409] __x64_sys_ioctl+0x73/0xb0 [ 1360.233285] do_syscall_64+0x1b9/0x820 [ 1360.237157] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1360.242507] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1360.247424] ? trace_hardirqs_on_caller+0x310/0x310 [ 1360.252428] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1360.257432] ? recalc_sigpending_tsk+0x180/0x180 [ 1360.262180] ? kasan_check_write+0x14/0x20 [ 1360.266427] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1360.271262] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1360.276435] RIP: 0033:0x4573e7 [ 1360.279612] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1360.298494] RSP: 002b:00007ff838176a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1360.306188] RAX: ffffffffffffffda RBX: 0000000020000150 RCX: 00000000004573e7 [ 1360.313454] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1360.320782] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1360.328032] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1360.335280] R13: 0000000000000000 R14: 00000000004d7ef0 R15: 0000000000000003 [ 1360.360750] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1360.395573] team0 (unregistering): Port device team_slave_1 removed [ 1360.417884] team0 (unregistering): Port device team_slave_0 removed [ 1360.433082] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1360.477045] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1360.549485] bond0 (unregistering): Released all slaves [ 1360.731353] bridge0: port 1(bridge_slave_0) entered blocking state [ 1360.737842] bridge0: port 1(bridge_slave_0) entered disabled state [ 1360.745316] device bridge_slave_0 entered promiscuous mode [ 1360.780890] bridge0: port 2(bridge_slave_1) entered blocking state [ 1360.787367] bridge0: port 2(bridge_slave_1) entered disabled state [ 1360.794635] device bridge_slave_1 entered promiscuous mode [ 1360.829444] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1360.865427] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1360.974492] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1361.015210] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1361.163531] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1361.170901] team0: Port device team_slave_0 added [ 1361.208242] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1361.215477] team0: Port device team_slave_1 added [ 1361.239127] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1361.264807] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1361.292126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1361.330370] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1361.540433] bridge0: port 2(bridge_slave_1) entered blocking state [ 1361.546820] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1361.553410] bridge0: port 1(bridge_slave_0) entered blocking state [ 1361.559795] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1362.274787] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1362.345744] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1362.414942] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1362.421059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1362.428424] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1362.493798] 8021q: adding VLAN 0 to HW filter on device team0 00:27:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0xc5c5, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000040)=@profile={'permprofile ', ':!#:keyringselfeth0ppp0%+ppp1\x00'}, 0x2a) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYBLOB], 0x1}}, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x6b, 0x0) 00:27:14 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x600, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:27:14 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x3075, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:27:14 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x9390000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:27:14 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0x7400]}, 0x10) 00:27:14 executing program 3 (fault-call:0 fault-nth:13): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") [ 1362.944928] net_ratelimit: 2 callbacks suppressed [ 1362.944946] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1362.969614] FAULT_INJECTION: forcing a failure. [ 1362.969614] name failslab, interval 1, probability 0, space 0, times 0 00:27:14 executing program 0: [ 1362.988961] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1363.003000] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1363.034984] CPU: 1 PID: 4167 Comm: syz-executor3 Not tainted 4.19.0-rc6+ #269 [ 1363.042279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1363.051639] Call Trace: [ 1363.054261] dump_stack+0x1c4/0x2b4 [ 1363.057911] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1363.063118] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1363.068664] ? replace_slot+0x151/0x520 [ 1363.072659] should_fail.cold.4+0xa/0x17 [ 1363.076733] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1363.081850] ? lock_release+0x970/0x970 [ 1363.085835] ? arch_local_save_flags+0x40/0x40 [ 1363.090443] ? __mutex_lock+0x85e/0x1700 [ 1363.094515] ? kernfs_activate+0x8e/0x2c0 [ 1363.098681] ? fs_reclaim_acquire+0x20/0x20 [ 1363.103014] ? lock_downgrade+0x900/0x900 [ 1363.107182] ? __mutex_lock+0x85e/0x1700 [ 1363.111272] ? ___might_sleep+0x1ed/0x300 [ 1363.115434] ? arch_local_save_flags+0x40/0x40 [ 1363.120038] ? kernfs_activate+0x21a/0x2c0 [ 1363.124287] __should_failslab+0x124/0x180 [ 1363.128532] should_failslab+0x9/0x14 [ 1363.132350] kmem_cache_alloc+0x2be/0x730 [ 1363.136513] ? lock_downgrade+0x900/0x900 [ 1363.140664] ? do_raw_spin_lock+0xc1/0x200 [ 1363.144905] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1363.149940] __kernfs_new_node+0x127/0x8d0 [ 1363.154188] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1363.158978] ? kasan_check_write+0x14/0x20 [ 1363.163256] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1363.168229] ? wait_for_completion+0x8a0/0x8a0 [ 1363.172804] ? wait_for_completion+0x8a0/0x8a0 [ 1363.177370] ? kasan_check_write+0x14/0x20 [ 1363.181640] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1363.186586] ? mutex_unlock+0xd/0x10 [ 1363.190289] ? kernfs_activate+0x21a/0x2c0 [ 1363.194537] ? kernfs_walk_and_get_ns+0x340/0x340 [ 1363.199367] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1363.204889] ? kernfs_link_sibling+0x1d2/0x3b0 [ 1363.209459] kernfs_new_node+0x95/0x120 [ 1363.213440] __kernfs_create_file+0x5a/0x340 [ 1363.217841] sysfs_add_file_mode_ns+0x222/0x530 [ 1363.222520] internal_create_group+0x3df/0xd80 [ 1363.227120] ? remove_files.isra.1+0x190/0x190 [ 1363.231702] ? up_write+0x7b/0x220 [ 1363.235248] ? up_read+0x110/0x110 [ 1363.238789] ? down_read+0x1d0/0x1d0 00:27:14 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xd50, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1363.242506] ? kasan_check_write+0x14/0x20 [ 1363.246758] sysfs_create_group+0x1f/0x30 [ 1363.250924] lo_ioctl+0x1310/0x1d80 [ 1363.254565] ? lo_rw_aio_complete+0x470/0x470 [ 1363.259062] blkdev_ioctl+0x9ac/0x2010 [ 1363.262938] ? blkpg_ioctl+0xc10/0xc10 [ 1363.266828] ? lock_downgrade+0x900/0x900 [ 1363.271008] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1363.276834] ? save_stack+0x43/0xd0 [ 1363.280475] ? __kasan_slab_free+0x102/0x150 [ 1363.284871] ? __fget+0x4d1/0x740 [ 1363.288312] ? ksys_dup3+0x680/0x680 [ 1363.292012] ? kasan_check_write+0x14/0x20 [ 1363.296248] block_ioctl+0xee/0x130 [ 1363.299867] ? blkdev_fallocate+0x400/0x400 [ 1363.304171] do_vfs_ioctl+0x1de/0x1720 [ 1363.308050] ? trace_hardirqs_on+0xbd/0x310 [ 1363.312371] ? ioctl_preallocate+0x300/0x300 [ 1363.316776] ? __fget_light+0x2e9/0x430 [ 1363.320760] ? fget_raw+0x20/0x20 [ 1363.324244] ? putname+0xf2/0x130 [ 1363.327693] ? kmem_cache_free+0x21a/0x290 [ 1363.331932] ? putname+0xf7/0x130 [ 1363.335376] ? do_sys_open+0x3ac/0x700 [ 1363.339299] ? security_file_ioctl+0x94/0xc0 00:27:14 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xc0fe, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1363.343695] ksys_ioctl+0xa9/0xd0 [ 1363.347135] __x64_sys_ioctl+0x73/0xb0 [ 1363.351020] do_syscall_64+0x1b9/0x820 [ 1363.354919] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1363.360302] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1363.365248] ? trace_hardirqs_on_caller+0x310/0x310 [ 1363.370290] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1363.375340] ? recalc_sigpending_tsk+0x180/0x180 [ 1363.380095] ? kasan_check_write+0x14/0x20 [ 1363.384346] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1363.389210] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1363.394395] RIP: 0033:0x4573e7 [ 1363.397576] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1363.416462] RSP: 002b:00007ff838176a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1363.424162] RAX: ffffffffffffffda RBX: 0000000020000150 RCX: 00000000004573e7 [ 1363.431444] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1363.438713] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 00:27:14 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x240, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1363.445990] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1363.453267] R13: 0000000000000000 R14: 00000000004d7ef0 R15: 0000000000000003 [ 1363.467692] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] 00:27:14 executing program 3 (fault-call:0 fault-nth:14): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") [ 1363.548273] FAULT_INJECTION: forcing a failure. [ 1363.548273] name failslab, interval 1, probability 0, space 0, times 0 [ 1363.559878] CPU: 1 PID: 4195 Comm: syz-executor3 Not tainted 4.19.0-rc6+ #269 [ 1363.567153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1363.576508] Call Trace: [ 1363.576533] dump_stack+0x1c4/0x2b4 [ 1363.576555] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1363.576572] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1363.576586] ? replace_slot+0x151/0x520 [ 1363.576608] should_fail.cold.4+0xa/0x17 [ 1363.601503] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1363.606618] ? lock_release+0x970/0x970 [ 1363.610593] ? arch_local_save_flags+0x40/0x40 [ 1363.615184] ? __mutex_lock+0x85e/0x1700 [ 1363.619250] ? kernfs_activate+0x8e/0x2c0 [ 1363.623410] ? fs_reclaim_acquire+0x20/0x20 [ 1363.627733] ? lock_downgrade+0x900/0x900 [ 1363.631878] ? __mutex_lock+0x85e/0x1700 [ 1363.635938] ? ___might_sleep+0x1ed/0x300 [ 1363.640103] ? arch_local_save_flags+0x40/0x40 [ 1363.644694] ? kernfs_activate+0x21a/0x2c0 [ 1363.648933] __should_failslab+0x124/0x180 [ 1363.653179] should_failslab+0x9/0x14 [ 1363.656993] kmem_cache_alloc+0x2be/0x730 [ 1363.661185] ? lock_downgrade+0x900/0x900 [ 1363.665338] ? do_raw_spin_lock+0xc1/0x200 [ 1363.669574] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1363.674588] __kernfs_new_node+0x127/0x8d0 [ 1363.678822] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1363.683578] ? kasan_check_write+0x14/0x20 [ 1363.687817] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1363.692743] ? wait_for_completion+0x8a0/0x8a0 [ 1363.697327] ? wait_for_completion+0x8a0/0x8a0 [ 1363.701903] ? kasan_check_write+0x14/0x20 [ 1363.706154] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1363.711112] ? mutex_unlock+0xd/0x10 [ 1363.714826] ? kernfs_activate+0x21a/0x2c0 [ 1363.719062] ? kernfs_walk_and_get_ns+0x340/0x340 [ 1363.723905] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1363.729439] ? kernfs_link_sibling+0x1d2/0x3b0 [ 1363.734035] kernfs_new_node+0x95/0x120 [ 1363.738013] __kernfs_create_file+0x5a/0x340 [ 1363.742438] sysfs_add_file_mode_ns+0x222/0x530 [ 1363.747118] internal_create_group+0x3df/0xd80 [ 1363.751719] ? remove_files.isra.1+0x190/0x190 [ 1363.756340] ? up_write+0x7b/0x220 [ 1363.759887] ? up_read+0x110/0x110 [ 1363.763425] ? down_read+0x1d0/0x1d0 [ 1363.767136] ? kasan_check_write+0x14/0x20 [ 1363.771375] sysfs_create_group+0x1f/0x30 [ 1363.775527] lo_ioctl+0x1310/0x1d80 [ 1363.779157] ? lo_rw_aio_complete+0x470/0x470 [ 1363.783653] blkdev_ioctl+0x9ac/0x2010 [ 1363.787635] ? blkpg_ioctl+0xc10/0xc10 [ 1363.791523] ? lock_downgrade+0x900/0x900 [ 1363.795677] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1363.801476] ? save_stack+0x43/0xd0 [ 1363.805102] ? __kasan_slab_free+0x102/0x150 [ 1363.809512] ? __fget+0x4d1/0x740 [ 1363.812970] ? ksys_dup3+0x680/0x680 [ 1363.816680] ? kasan_check_write+0x14/0x20 [ 1363.820921] block_ioctl+0xee/0x130 [ 1363.824550] ? blkdev_fallocate+0x400/0x400 [ 1363.828875] do_vfs_ioctl+0x1de/0x1720 [ 1363.832763] ? trace_hardirqs_on+0xbd/0x310 [ 1363.837085] ? ioctl_preallocate+0x300/0x300 [ 1363.841490] ? __fget_light+0x2e9/0x430 [ 1363.845468] ? fget_raw+0x20/0x20 [ 1363.848934] ? putname+0xf2/0x130 [ 1363.852388] ? kmem_cache_free+0x21a/0x290 [ 1363.856642] ? putname+0xf7/0x130 [ 1363.860097] ? do_sys_open+0x3ac/0x700 [ 1363.863992] ? security_file_ioctl+0x94/0xc0 [ 1363.868400] ksys_ioctl+0xa9/0xd0 [ 1363.871853] __x64_sys_ioctl+0x73/0xb0 [ 1363.875744] do_syscall_64+0x1b9/0x820 [ 1363.879631] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1363.884996] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1363.889926] ? trace_hardirqs_on_caller+0x310/0x310 [ 1363.894941] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1363.899967] ? recalc_sigpending_tsk+0x180/0x180 [ 1363.904719] ? kasan_check_write+0x14/0x20 [ 1363.908965] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1363.913812] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1363.918998] RIP: 0033:0x4573e7 [ 1363.922189] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1363.941186] RSP: 002b:00007ff838176a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 00:27:15 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0x10]}, 0x10) [ 1363.948905] RAX: ffffffffffffffda RBX: 0000000020000150 RCX: 00000000004573e7 [ 1363.956179] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1363.963476] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1363.970741] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1363.978004] R13: 0000000000000000 R14: 00000000004d7ef0 R15: 0000000000000003 00:27:15 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x600, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:27:15 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x500, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1364.019775] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] 00:27:15 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xea03, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:27:15 executing program 0: [ 1364.073059] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1364.094667] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:27:15 executing program 3 (fault-call:0 fault-nth:15): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") [ 1364.180138] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1364.226045] IPVS: ftp: loaded support on port[0] = 21 [ 1364.250051] FAULT_INJECTION: forcing a failure. [ 1364.250051] name failslab, interval 1, probability 0, space 0, times 0 [ 1364.274347] CPU: 1 PID: 4221 Comm: syz-executor3 Not tainted 4.19.0-rc6+ #269 [ 1364.281653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1364.291011] Call Trace: [ 1364.293620] dump_stack+0x1c4/0x2b4 [ 1364.297270] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1364.302476] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1364.308021] ? replace_slot+0x151/0x520 [ 1364.312011] should_fail.cold.4+0xa/0x17 [ 1364.316102] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1364.321237] ? lock_release+0x970/0x970 [ 1364.325230] ? arch_local_save_flags+0x40/0x40 [ 1364.329837] ? __mutex_lock+0x85e/0x1700 [ 1364.333908] ? kernfs_activate+0x8e/0x2c0 [ 1364.338072] ? fs_reclaim_acquire+0x20/0x20 [ 1364.342407] ? lock_downgrade+0x900/0x900 [ 1364.346591] ? __mutex_lock+0x85e/0x1700 [ 1364.350666] ? ___might_sleep+0x1ed/0x300 [ 1364.354828] ? arch_local_save_flags+0x40/0x40 [ 1364.359429] ? kernfs_activate+0x21a/0x2c0 [ 1364.363691] __should_failslab+0x124/0x180 [ 1364.367934] should_failslab+0x9/0x14 [ 1364.371751] kmem_cache_alloc+0x2be/0x730 [ 1364.375909] ? lock_downgrade+0x900/0x900 [ 1364.380066] ? do_raw_spin_lock+0xc1/0x200 [ 1364.384315] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1364.389340] __kernfs_new_node+0x127/0x8d0 [ 1364.393589] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1364.398346] ? kasan_check_write+0x14/0x20 [ 1364.402568] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1364.407480] ? wait_for_completion+0x8a0/0x8a0 [ 1364.412092] ? wait_for_completion+0x8a0/0x8a0 [ 1364.412107] ? kasan_check_write+0x14/0x20 [ 1364.412123] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1364.412142] ? mutex_unlock+0xd/0x10 [ 1364.420978] ? kernfs_activate+0x21a/0x2c0 [ 1364.420995] ? kernfs_walk_and_get_ns+0x340/0x340 [ 1364.421014] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1364.429634] ? kernfs_link_sibling+0x1d2/0x3b0 00:27:15 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xe6010000000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1364.429654] kernfs_new_node+0x95/0x120 [ 1364.429674] __kernfs_create_file+0x5a/0x340 [ 1364.429694] sysfs_add_file_mode_ns+0x222/0x530 [ 1364.429716] internal_create_group+0x3df/0xd80 [ 1364.429739] ? remove_files.isra.1+0x190/0x190 [ 1364.429752] ? up_write+0x7b/0x220 [ 1364.429764] ? up_read+0x110/0x110 [ 1364.429778] ? down_read+0x1d0/0x1d0 [ 1364.429796] ? kasan_check_write+0x14/0x20 [ 1364.438871] sysfs_create_group+0x1f/0x30 [ 1364.438890] lo_ioctl+0x1310/0x1d80 [ 1364.438911] ? lo_rw_aio_complete+0x470/0x470 [ 1364.438929] blkdev_ioctl+0x9ac/0x2010 [ 1364.438945] ? blkpg_ioctl+0xc10/0xc10 [ 1364.438969] ? lock_downgrade+0x900/0x900 [ 1364.438993] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1364.439012] ? save_stack+0x43/0xd0 [ 1364.439029] ? __kasan_slab_free+0x102/0x150 [ 1364.449173] ? __fget+0x4d1/0x740 [ 1364.449194] ? ksys_dup3+0x680/0x680 [ 1364.449221] ? kasan_check_write+0x14/0x20 [ 1364.449243] block_ioctl+0xee/0x130 [ 1364.449257] ? blkdev_fallocate+0x400/0x400 [ 1364.449273] do_vfs_ioctl+0x1de/0x1720 [ 1364.449291] ? trace_hardirqs_on+0xbd/0x310 [ 1364.449308] ? ioctl_preallocate+0x300/0x300 [ 1364.449323] ? __fget_light+0x2e9/0x430 [ 1364.449338] ? fget_raw+0x20/0x20 [ 1364.449355] ? putname+0xf2/0x130 [ 1364.457726] ? kmem_cache_free+0x21a/0x290 [ 1364.457742] ? putname+0xf7/0x130 [ 1364.457759] ? do_sys_open+0x3ac/0x700 [ 1364.457779] ? security_file_ioctl+0x94/0xc0 [ 1364.457795] ksys_ioctl+0xa9/0xd0 [ 1364.457814] __x64_sys_ioctl+0x73/0xb0 [ 1364.457832] do_syscall_64+0x1b9/0x820 [ 1364.457847] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1364.457864] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1364.457881] ? trace_hardirqs_on_caller+0x310/0x310 [ 1364.457897] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1364.457913] ? recalc_sigpending_tsk+0x180/0x180 [ 1364.457930] ? kasan_check_write+0x14/0x20 [ 1364.467180] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1364.467223] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1364.467235] RIP: 0033:0x4573e7 00:27:15 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x1206779178f, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1364.467250] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1364.467258] RSP: 002b:00007ff838176a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1364.467285] RAX: ffffffffffffffda RBX: 0000000020000150 RCX: 00000000004573e7 [ 1364.467292] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1364.467313] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1364.467332] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1364.467340] R13: 0000000000000000 R14: 00000000004d7ef0 R15: 0000000000000003 [ 1364.528870] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1364.532180] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1364.723064] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:27:15 executing program 3 (fault-call:0 fault-nth:16): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:27:15 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xfe800000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1364.824184] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1364.834672] FAULT_INJECTION: forcing a failure. [ 1364.834672] name failslab, interval 1, probability 0, space 0, times 0 [ 1364.846276] CPU: 0 PID: 4239 Comm: syz-executor3 Not tainted 4.19.0-rc6+ #269 [ 1364.853574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1364.862932] Call Trace: [ 1364.865525] dump_stack+0x1c4/0x2b4 [ 1364.869160] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1364.874354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1364.879885] ? replace_slot+0x151/0x520 [ 1364.883868] should_fail.cold.4+0xa/0x17 [ 1364.887933] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1364.893038] ? lock_release+0x970/0x970 [ 1364.897015] ? arch_local_save_flags+0x40/0x40 [ 1364.901608] ? __mutex_lock+0x85e/0x1700 [ 1364.905668] ? kernfs_activate+0x8e/0x2c0 [ 1364.909821] ? fs_reclaim_acquire+0x20/0x20 [ 1364.914137] ? lock_downgrade+0x900/0x900 [ 1364.918305] ? __mutex_lock+0x85e/0x1700 [ 1364.922365] ? ___might_sleep+0x1ed/0x300 [ 1364.926514] ? arch_local_save_flags+0x40/0x40 [ 1364.931091] ? kernfs_activate+0x21a/0x2c0 [ 1364.935332] __should_failslab+0x124/0x180 [ 1364.939572] should_failslab+0x9/0x14 [ 1364.943370] kmem_cache_alloc+0x2be/0x730 [ 1364.947530] ? lock_downgrade+0x900/0x900 [ 1364.951677] ? do_raw_spin_lock+0xc1/0x200 [ 1364.955910] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1364.960924] __kernfs_new_node+0x127/0x8d0 [ 1364.965171] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1364.969927] ? kasan_check_write+0x14/0x20 [ 1364.974166] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1364.979100] ? wait_for_completion+0x8a0/0x8a0 [ 1364.983683] ? wait_for_completion+0x8a0/0x8a0 [ 1364.988266] ? kasan_check_write+0x14/0x20 [ 1364.992503] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1364.997437] ? mutex_unlock+0xd/0x10 [ 1365.001157] ? kernfs_activate+0x21a/0x2c0 [ 1365.005390] ? kernfs_walk_and_get_ns+0x340/0x340 [ 1365.010320] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1365.015855] ? kernfs_link_sibling+0x1d2/0x3b0 [ 1365.020436] kernfs_new_node+0x95/0x120 [ 1365.024430] __kernfs_create_file+0x5a/0x340 [ 1365.028843] sysfs_add_file_mode_ns+0x222/0x530 [ 1365.033523] internal_create_group+0x3df/0xd80 [ 1365.038108] ? remove_files.isra.1+0x190/0x190 [ 1365.042685] ? up_write+0x7b/0x220 [ 1365.046229] ? up_read+0x110/0x110 [ 1365.049766] ? down_read+0x1d0/0x1d0 [ 1365.053481] ? kasan_check_write+0x14/0x20 [ 1365.057724] sysfs_create_group+0x1f/0x30 [ 1365.061878] lo_ioctl+0x1310/0x1d80 [ 1365.065510] ? lo_rw_aio_complete+0x470/0x470 [ 1365.070006] blkdev_ioctl+0x9ac/0x2010 [ 1365.073895] ? blkpg_ioctl+0xc10/0xc10 [ 1365.077783] ? lock_downgrade+0x900/0x900 [ 1365.081935] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1365.087737] ? save_stack+0x43/0xd0 [ 1365.091362] ? __kasan_slab_free+0x102/0x150 [ 1365.095774] ? __fget+0x4d1/0x740 [ 1365.099239] ? ksys_dup3+0x680/0x680 [ 1365.102948] ? kasan_check_write+0x14/0x20 [ 1365.107190] block_ioctl+0xee/0x130 [ 1365.110829] ? blkdev_fallocate+0x400/0x400 [ 1365.115149] do_vfs_ioctl+0x1de/0x1720 [ 1365.119036] ? trace_hardirqs_on+0xbd/0x310 [ 1365.123358] ? ioctl_preallocate+0x300/0x300 [ 1365.127884] ? __fget_light+0x2e9/0x430 [ 1365.131866] ? fget_raw+0x20/0x20 [ 1365.135328] ? putname+0xf2/0x130 [ 1365.138788] ? kmem_cache_free+0x21a/0x290 [ 1365.143022] ? putname+0xf7/0x130 [ 1365.146482] ? do_sys_open+0x3ac/0x700 [ 1365.150394] ? security_file_ioctl+0x94/0xc0 [ 1365.154818] ksys_ioctl+0xa9/0xd0 [ 1365.158273] __x64_sys_ioctl+0x73/0xb0 [ 1365.162158] do_syscall_64+0x1b9/0x820 [ 1365.166042] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1365.171404] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1365.176336] ? trace_hardirqs_on_caller+0x310/0x310 [ 1365.181355] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1365.186370] ? recalc_sigpending_tsk+0x180/0x180 [ 1365.191122] ? kasan_check_write+0x14/0x20 [ 1365.195371] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1365.200227] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1365.205417] RIP: 0033:0x4573e7 [ 1365.208611] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1365.227516] RSP: 002b:00007ff838176a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1365.235230] RAX: ffffffffffffffda RBX: 0000000020000150 RCX: 00000000004573e7 [ 1365.242497] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1365.249759] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1365.257022] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1365.264303] R13: 0000000000000000 R14: 00000000004d7ef0 R15: 0000000000000003 00:27:16 executing program 5: 00:27:16 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0x700000000000000]}, 0x10) 00:27:16 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x240, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:27:16 executing program 5: 00:27:16 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x3f00, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1365.378381] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 00:27:16 executing program 5: [ 1365.421027] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1365.644160] device bridge_slave_1 left promiscuous mode [ 1365.649691] bridge0: port 2(bridge_slave_1) entered disabled state [ 1365.704704] device bridge_slave_0 left promiscuous mode [ 1365.710527] bridge0: port 1(bridge_slave_0) entered disabled state [ 1365.768454] team0 (unregistering): Port device team_slave_1 removed [ 1365.777519] team0 (unregistering): Port device team_slave_0 removed [ 1365.787019] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1365.857292] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1365.926305] bond0 (unregistering): Released all slaves [ 1366.338779] bridge0: port 1(bridge_slave_0) entered blocking state [ 1366.345410] bridge0: port 1(bridge_slave_0) entered disabled state [ 1366.352776] device bridge_slave_0 entered promiscuous mode [ 1366.392307] bridge0: port 2(bridge_slave_1) entered blocking state [ 1366.398847] bridge0: port 2(bridge_slave_1) entered disabled state [ 1366.406617] device bridge_slave_1 entered promiscuous mode [ 1366.446073] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1366.485217] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1366.594858] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1366.623614] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1366.749864] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1366.757292] team0: Port device team_slave_0 added [ 1366.785223] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1366.792676] team0: Port device team_slave_1 added [ 1366.823381] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1366.848725] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1366.873292] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1366.898570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1367.099449] bridge0: port 2(bridge_slave_1) entered blocking state [ 1367.105853] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1367.112431] bridge0: port 1(bridge_slave_0) entered blocking state [ 1367.118852] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1367.126469] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1367.842830] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1367.913493] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1367.984029] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1367.990134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1367.997915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1368.023946] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1368.070527] 8021q: adding VLAN 0 to HW filter on device team0 00:27:19 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/145, &(0x7f00000000c0)=0x91) 00:27:19 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xb608086720010000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:27:19 executing program 3 (fault-call:0 fault-nth:17): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:27:19 executing program 5: 00:27:19 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x3f000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:27:19 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0x6800000000000000]}, 0x10) 00:27:19 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000040c0)={0x0, 0x0, &(0x7f0000001700)={&(0x7f0000003fc0)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 00:27:19 executing program 0: getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f00000002c0), &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @rand_addr}}}, 0x84) creat(&(0x7f0000000200)='./file0\x00', 0x21) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000140)="153f6234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000002bc0)='overlay\x00', 0x0, &(0x7f0000000000)={[{@index_on='index=on'}, {@lowerdir={'lowerdir', 0x3d, './file1'}}]}) [ 1368.518830] net_ratelimit: 2 callbacks suppressed [ 1368.518846] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1368.525491] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1368.540983] FAULT_INJECTION: forcing a failure. [ 1368.540983] name failslab, interval 1, probability 0, space 0, times 0 [ 1368.553633] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1368.610070] CPU: 1 PID: 4528 Comm: syz-executor3 Not tainted 4.19.0-rc6+ #269 [ 1368.617372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1368.626731] Call Trace: [ 1368.629348] dump_stack+0x1c4/0x2b4 [ 1368.633000] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1368.638191] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1368.643743] should_fail.cold.4+0xa/0x17 [ 1368.647810] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1368.652910] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1368.658448] ? wake_up_klogd+0x11a/0x180 [ 1368.662505] ? preempt_schedule_common+0x1f/0xd0 [ 1368.667270] ? console_device+0xc0/0xc0 [ 1368.671246] ? ___preempt_schedule+0x16/0x18 [ 1368.675655] ? vprintk_emit+0x268/0x930 [ 1368.679628] ? wake_up_klogd+0x180/0x180 [ 1368.683689] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1368.689241] ? kernfs_link_sibling+0x1d2/0x3b0 [ 1368.693825] ? fs_reclaim_acquire+0x20/0x20 [ 1368.698156] ? lock_downgrade+0x900/0x900 [ 1368.702322] ? ___might_sleep+0x1ed/0x300 [ 1368.706471] ? arch_local_save_flags+0x40/0x40 [ 1368.711059] ? vprintk_default+0x28/0x30 [ 1368.715127] __should_failslab+0x124/0x180 [ 1368.719361] should_failslab+0x9/0x14 [ 1368.723165] kmem_cache_alloc_trace+0x2d7/0x750 [ 1368.727854] kobject_uevent_env+0x2f3/0x101e [ 1368.732259] ? kasan_check_write+0x14/0x20 [ 1368.736498] kobject_uevent+0x1f/0x24 [ 1368.740301] lo_ioctl+0x138e/0x1d80 [ 1368.743932] ? lo_rw_aio_complete+0x470/0x470 [ 1368.748435] blkdev_ioctl+0x9ac/0x2010 [ 1368.752323] ? blkpg_ioctl+0xc10/0xc10 [ 1368.756217] ? lock_downgrade+0x900/0x900 [ 1368.760373] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1368.766171] ? save_stack+0x43/0xd0 [ 1368.769799] ? __kasan_slab_free+0x102/0x150 [ 1368.774237] ? __fget+0x4d1/0x740 [ 1368.777691] ? ksys_dup3+0x680/0x680 [ 1368.781402] ? kasan_check_write+0x14/0x20 [ 1368.785641] block_ioctl+0xee/0x130 [ 1368.789279] ? blkdev_fallocate+0x400/0x400 [ 1368.793609] do_vfs_ioctl+0x1de/0x1720 [ 1368.797497] ? trace_hardirqs_on+0xbd/0x310 [ 1368.801820] ? ioctl_preallocate+0x300/0x300 [ 1368.806263] ? __fget_light+0x2e9/0x430 [ 1368.810229] ? fget_raw+0x20/0x20 [ 1368.813685] ? putname+0xf2/0x130 [ 1368.817149] ? kmem_cache_free+0x21a/0x290 [ 1368.821400] ? putname+0xf7/0x130 [ 1368.824852] ? do_sys_open+0x3ac/0x700 [ 1368.828767] ? security_file_ioctl+0x94/0xc0 [ 1368.833175] ksys_ioctl+0xa9/0xd0 [ 1368.836649] __x64_sys_ioctl+0x73/0xb0 [ 1368.840535] do_syscall_64+0x1b9/0x820 [ 1368.844423] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1368.849789] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1368.854721] ? trace_hardirqs_on_caller+0x310/0x310 [ 1368.859733] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1368.864751] ? recalc_sigpending_tsk+0x180/0x180 [ 1368.869504] ? kasan_check_write+0x14/0x20 [ 1368.873740] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1368.878585] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1368.883768] RIP: 0033:0x4573e7 [ 1368.886965] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1368.905858] RSP: 002b:00007ff838176a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1368.913565] RAX: ffffffffffffffda RBX: 0000000020000150 RCX: 00000000004573e7 [ 1368.920832] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1368.928108] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1368.935383] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1368.942645] R13: 0000000000000000 R14: 00000000004d7ef0 R15: 0000000000000003 00:27:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='ubi0'], &(0x7f00000002c0)='./file0\x00', &(0x7f00000000c0)='ubifs\x00', 0x0, &(0x7f0000000140)='adfs\x00') 00:27:20 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xfec00000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1368.986906] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1369.032647] UBIFS error (pid: 4551): cannot open "ubi0", error -19 [ 1369.053825] UBIFS error (pid: 4554): cannot open "ubi0", error -19 00:27:20 executing program 3 (fault-call:0 fault-nth:18): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:27:20 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x0, 0x0) r1 = dup(r0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0x40085400, &(0x7f0000000040)={0xb}) [ 1369.087528] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:27:20 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xa, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1369.227995] FAULT_INJECTION: forcing a failure. [ 1369.227995] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1369.239856] CPU: 1 PID: 4561 Comm: syz-executor3 Not tainted 4.19.0-rc6+ #269 [ 1369.247129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1369.256485] Call Trace: [ 1369.259091] dump_stack+0x1c4/0x2b4 [ 1369.262739] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1369.267940] ? up+0xea/0x1c0 [ 1369.270989] ? lock_downgrade+0x900/0x900 00:27:20 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x3f000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1369.275167] should_fail.cold.4+0xa/0x17 [ 1369.279263] ? trace_hardirqs_off+0xb8/0x310 [ 1369.283685] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1369.288805] ? console_unlock+0x83a/0x1160 [ 1369.293044] ? lock_downgrade+0x900/0x900 [ 1369.297207] ? mark_held_locks+0x130/0x130 [ 1369.301446] ? vprintk_emit+0x33d/0x930 [ 1369.305426] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1369.310917] ? kasan_check_write+0x14/0x20 [ 1369.315176] ? do_raw_spin_lock+0xc1/0x200 [ 1369.319459] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1369.325007] ? llist_add_batch+0x106/0x170 [ 1369.329264] ? check_preemption_disabled+0x48/0x200 [ 1369.334292] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1369.339838] ? should_fail+0x22d/0xd01 [ 1369.343734] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1369.349299] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1369.354414] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1369.359973] ? wake_up_klogd+0x11a/0x180 [ 1369.364044] __alloc_pages_nodemask+0x34b/0xde0 [ 1369.368719] ? __down_trylock_console_sem+0x155/0x200 00:27:20 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x3909, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1369.373921] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 1369.378976] ? vprintk_emit+0x268/0x930 [ 1369.382975] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1369.388522] ? kernfs_link_sibling+0x1d2/0x3b0 [ 1369.393113] ? fs_reclaim_acquire+0x20/0x20 [ 1369.397441] ? lock_downgrade+0x900/0x900 [ 1369.401609] ? ___might_sleep+0x1ed/0x300 [ 1369.405768] ? trace_hardirqs_off+0xb8/0x310 [ 1369.410207] cache_grow_begin+0x91/0x8c0 [ 1369.414279] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1369.419828] kmem_cache_alloc_trace+0x67e/0x750 [ 1369.424517] kobject_uevent_env+0x2f3/0x101e [ 1369.428932] ? kasan_check_write+0x14/0x20 [ 1369.433202] kobject_uevent+0x1f/0x24 [ 1369.433613] IPVS: ftp: loaded support on port[0] = 21 [ 1369.437012] lo_ioctl+0x138e/0x1d80 [ 1369.437033] ? lo_rw_aio_complete+0x470/0x470 [ 1369.437054] blkdev_ioctl+0x9ac/0x2010 [ 1369.450347] ? blkpg_ioctl+0xc10/0xc10 [ 1369.450363] ? lock_downgrade+0x900/0x900 [ 1369.450385] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1369.458153] ? save_stack+0x43/0xd0 [ 1369.458166] ? __kasan_slab_free+0x102/0x150 [ 1369.458186] ? __fget+0x4d1/0x740 [ 1369.468166] ? ksys_dup3+0x680/0x680 [ 1369.468181] ? kasan_check_write+0x14/0x20 [ 1369.468212] block_ioctl+0xee/0x130 [ 1369.476226] ? blkdev_fallocate+0x400/0x400 [ 1369.476243] do_vfs_ioctl+0x1de/0x1720 [ 1369.476263] ? trace_hardirqs_on+0xbd/0x310 [ 1369.483409] ? ioctl_preallocate+0x300/0x300 [ 1369.483425] ? __fget_light+0x2e9/0x430 [ 1369.483442] ? fget_raw+0x20/0x20 [ 1369.491292] ? putname+0xf2/0x130 [ 1369.491309] ? kmem_cache_free+0x21a/0x290 [ 1369.491325] ? putname+0xf7/0x130 [ 1369.499514] ? do_sys_open+0x3ac/0x700 [ 1369.499535] ? security_file_ioctl+0x94/0xc0 [ 1369.499553] ksys_ioctl+0xa9/0xd0 [ 1369.508265] __x64_sys_ioctl+0x73/0xb0 [ 1369.508290] do_syscall_64+0x1b9/0x820 [ 1369.515697] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1369.515715] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1369.515737] ? trace_hardirqs_on_caller+0x310/0x310 [ 1369.523416] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1369.530724] ? recalc_sigpending_tsk+0x180/0x180 [ 1369.530739] ? kasan_check_write+0x14/0x20 00:27:20 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0xfeffffff]}, 0x10) [ 1369.530759] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1369.538604] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1369.538621] RIP: 0033:0x4573e7 [ 1369.546374] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1369.546382] RSP: 002b:00007ff838176a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1369.546403] RAX: ffffffffffffffda RBX: 0000000020000150 RCX: 00000000004573e7 00:27:20 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = getpid() kcmp(r2, r2, 0x0, r1, r0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x8, 0x4100) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000080)) ptrace$peekuser(0x3, r2, 0x3) 00:27:20 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x3ea, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1369.556678] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1369.556686] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1369.556694] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1369.556702] R13: 0000000000000000 R14: 00000000004d7ef0 R15: 0000000000000003 [ 1369.636936] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available 00:27:20 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000740)="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", 0x1f3, 0xd}]) r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x10000) write$selinux_attr(r0, &(0x7f00000004c0)='system_u:object_r:devlog_t:s0\x00', 0x1e) syz_mount_image$minix(&(0x7f0000000640)='minix\x00', &(0x7f0000000680)='./file0\x00', 0x5, 0x9, &(0x7f0000002d80)=[{&(0x7f0000000940)="e917479cf5379e3d4a3fc0c79f6234721ced5815d2735fbb2e43945fd899d05bed9b686919e6989fbdea54920a4c4a88ad76bfd671143e816698e47997f8685d87fcf94351860f4e44f6fec9d94c8a0bfeb3ab901edbe2dd189c07f40c2cb34e5a3c9cb560f4467cea7e7f98f49f35cc4291b951fe42e8bd0affdfe7f68289bab65607cab2e58497d1c14bf761f2ebc00d59508a9fb04acc0077fbc952812d9575026bc565a2805532a5407b6eaada902c4c1c5fb467bddf187829e17b766e6a964011f5cfae8321f224452dbccd3d6bc0cc8f8d0a18146cdda077b41892bbda0799b220bb832d23cbbd2e5c0ab6624f", 0xf0, 0xfff}, {&(0x7f00000006c0), 0x0, 0x7fff}, {&(0x7f0000000a40)="99bc852d8417c00ea5637f792d1b7da5630a85d8d39405ad8ca587397e8b3a28f98ff897151df4afdc28f4fd164ea1e28b69bba9745659da797af54a2e6f730fa8f63ebf3b493d2aa3f07cda010792db64139bd06876476bdf198a0fac87a5943cac51c01751413b2bc832e1391252858bb853da6cec9de438db8c04d9f0e3fe94c67cf6ef040300573dd5a0bf69328d9cd9913c05706f37d5086dc345790dd49a71332153cea0d1cd64", 0xaa, 0x9}, {&(0x7f0000000b00)="5310c75ac67ce7c7f8141f47d094c8a05124169fe2313373f70ec368406bedd00d83ee272d0f237805c19543619c3d9d6e952170194af6b68a66ebb6a16735e1d8f3929b00e5beb41fc4f6f25fad8de081e1", 0x52, 0xfff}, {&(0x7f0000000b80)="15e27202e9f88319cb9a44993b8fd3c3495fa416ae6f697a1bfbb8a9a59be753dc1f75a2c96fb2cd76bc85f3063a9ac888aab1821483cf5515de27ece9bbb1596e791c65b754b167604f1deb7dccc4dccbea1eda785a4b3a0eb3b607337f7cbe81c975fda90e1fb17b4595", 0x6b, 0x5}, {&(0x7f0000000c00)="aebbefa59eec7929d6f2774227d78d8767a3d406dbbb77559de77aee353efe47652cd0ee5fa08a49666e01ae55f7cf442db865b94d16fe6c6ba8c6da91e9cddf49502db34856434444fc7fbb984aec89624d1a9e940dd3a9e1101a6979977d1f9673b782f30886f8ee5a1ad9f8ad5650baedc73d1fdfed719145bf090c94802ba3d2fa467a74e8cea5253a23c99e871facc9ed94e99ea3d12f1f1787a89dd5ac2383f7b8a6063bbdbe8ac6f75d112f0a2c33a4b9877de6f99b2f5ebe2da22de3b827c284f3e0f14279b44f10f1fd183531e764bcab51e7b9848761e3e2a09c2123b5213c81357f215ec24efd45f2f7488f82e5fd321fcf146043adbab8fa49bcf16e8da2a635cf70f471ff8f017852de093925aa4f1343d2034f6d6d8d55460096109912c51605b48040d8f7c836459123ca3f6cbfc817d1b446888bbd017f74d86964b77a646840a79670f9bbcafc2065d408818db443e0297cd70cc0713bcf87f71396948311d7aa384ef00a3900b0ac334c48bef978f630c363879d3e276324555efb5f72ae8d435eaaf68891a134a4f6260b0ed43b64b56c1e4f42116f1be74c1b11aa8881d504a316254a10dd4199f3917ba7cd344ae13790888da073cb47caa139daf89730ef52bac4a9e34394199affb6168ee0d6002dd31306e35cc6c3116946816408ddee8fb9904ef8820e230daea4554dd0c3ba995222c08e529b5f3ef14f784e1a87bd06de940e951abf5fbbde40701df15563fbab9957892304611dbdf4ff64f16abfed0b1ec6fbcf62664d644a7a266622a0fe0c9cd39321646c9b248ba6cd7bcdd9e7c504493fcbf47182788469f6aafd17429ad3fdf8f1aadb547aa76e07de1ad3a0bffee34df8a3725cfdee510cd9aebe2527832e098166dc7d22ace84942df643272b87f6c83541c8a0fac115ede193609383cdf5671ea84d1a96f6251197f603528b6992e9ad16801ebaf1e7e3262e51e0d90bdc83074b4507685832ec623a4fc108935e3f02eb90f08c119c8692876af5bc658290fe76714e17a2bff5c85fc3a519cb28e03088fb0a652e4253537fc0517612e24a4a6911ac554ab910b8f4e8190af34ef997ece03f779cd5e47b6b71cc40b373c78d3e7223fd120615f6a09b20b9c9670bf55ebc6da6945e71e76f121d0eebe621cf218878ae67ffa47c4e5eefb528ecadcb1e6519857aa76e1dc1186a27eff93fbbd63ff241fb938669e6e16d19c4c4fd7fae401fecabab1d9e269400d4c54294e8eb30b6fc20457c059ef961cefb9749aa4311be9e275ff1af725edbd2fbafee05bbe81428a11799e86b0a703f407dc77d6bf8d533723a53242fb3841e827d5fe22c87c9880333055dd9b330e18cabe78dda80199347efb24f7e70784aec75c471583170b6733c756ad8721a5e458fa5db3dd8e1fef4e666412f21a8994ad21a9ea55abc251da66fa39db132b62720b653e9a23956d22dfdbecc6de091d50a7bbe149703dd271648f360971e06eef7ad0926ee6d9566000375f98ddc61280f3368267540c5bcd4ec40d06aab11fe641703f00c62ce0334fbd025d3711bce1e0653cefd8a011a5c5fd9fe2ef1bb0131a535b78413f953caa8ec99919b029256f533818a2f5fd2fac1b99d0755ed448238cb4dc1756eae86a796057fc33ef83dbd9063f56a790b0f0cdf4deebf2076f85f352de3605ab80bb77b6c84b7a00ecf987532b3a35c13e02bf05e2bb3624361f78717fc56bea8c0cdf1402c2b73d214c25555acbae827dc0da892959c0031a4ab163a093c41dc512e18cb7bf5d853bcae4e28587fd824167e5c5471ad023c248f312ec405be1cf0dc8e058e9a4e82aa2801a8f10a9199be9037fe8d7673f0141d574f05131579adb8d06e565383997fe6238a64f610455bc86349ae97978a083fcc6330da7f1810286c1131d0bdf448be7025ac61bd8713ede0c83ede745ac7a5f3440e7516d6fec7cb5bba7fb52ec8ced3a7db7135ff69b15977ca5b6479ae5c43ffef20b3be54d230dbaa1631c366416a53c67fed6e4302e5e4f534fc2ba608cbf58d8ad510692cdde7a816af29a6a4356510356bfe4e65ae5cd9ae7c650c3f36c542904f07317e52945f0078b4e84ae2b7dee886f414d66cfab1eb271b2bbf1567144ad238198b70076e7897a02fba66fe4e21dd69664989133bab36461b2a0a370d9be212773aae1fd8903f7f8c16bbb8f85c08e1125ea631466016fa6a37f281b28452714bfe1ea876c852f9c4856598cfcb8651ef08814278b4a9033f5b23fc7c63eb06bbace784e237d279a4a6e5171f55e82577c3c61d43e7f7eeba9ca8126f0333db84d2ba5ea8d0a37ed685ba8a47dbac3d2ff2385269c15ebcdbd1e5c21560e73602efbad7542b8373ad0682b940a4dd989aa5a29b76cc04a5ea7a4166b68483126a2328c96610f30a3209c7c98f8e953170431b0ce96327e0cedc5bc989098926973b0f4ff7ec40d36a3fc0b0e4927339d8fb1b59fa3c44fafda398b43d4d970dabbadbeccdf0e354c8bc230ac18d55d144f8c96ec69eef800f54d85a6ea8e9e920d1a60dcadbba05de905ccdda69afc23e7798c9c34ad39177033eb81fa6f4d9af13aed26cba422bbccf8daf3c9abc2e8ef490a434870a07a4dacf6ec51197d77007c40d48410855a17d837c7c4488018517f16921e4740708d5c5b91ccd72d8f1f5d954a7927aa206bc35992cf09ce27bbcd147c51cd0c78c2dd4cf9d6d4549e600509eb5ed5ade92ff6c5ab825b632fe6629596eebb59bb36969b383bfccfdc0f6b6d47c34c05d646aaffdd8741ba7005aeb6797ea6bbab0254dc64e966593f93b9ed57cae91e0afa284374abf08f2e7e0b2d99b6c55ef2fae3fafe1a850c80c09c6b5602c0fbb4c58075f241aabda1091afd111ba1c895d94b1a095a6adbefe12e0718565b8863444c9f88fca97385ecf3e7fbc4740b64515559f5e2970e140911be7da4c0fcbec59cb1d90a6ab19a01c1e60bd83d56deac22691ea1ed2c5ba0f0c0f2cdc2739b20bd90d90a27b0e11091b0fa88e97237fbbb481086e570f3c2337c9f95163f02dc49ebe0525be9537a8371fc4ce8ce4e9f94df82d7f61e8e08a5548101816954cf1c6a49b23bf34527752d9435ee09a29c6fbd8bea32c61efe5eb1b9131655a32a87089197bd534b197140acc64138aea0c7d0ef10c5f9079baa984384b6942306abf95a1eac39596319e08a6db5b6dc29564999821e50bd2a2c807052ee002e5a2677054bf30fb6dbea54d8174d1ea359dcecde3b73d060d495b15e204b44e83255e312f3ad81e02191fc9e4ad468762900e430208f12e635e0f266bfd1aaaf605d64a31d15349dc5beb06242f46fd7f851df85b37b456d48bf8dc51a0e89e1a0ddcf82f3fe017ce836dc29e0c6c368e9a6637a67a8babefc716e5db529475b3dc799efab8309586c4fcfb14dcf2db035c7cbe6509ff5da8e67aa3da06ea39a477988a92d99df0dd713e99cf1a1fbb700c608bb622fb3f4c16749b2a4ba49217ad33681d46a4b189d15f0cf005487e3008519d469c54d73a8aebcb9d37162a372fa599ff8dfecb4d4b026ea10902f560053a5d02f724b995f6c053e601a9fe5d2ef01cbf5e64e3620bfc26f2baba936c5f65fb3011bd01e22493118241c24644d58b9731ff5e3d50e8a0f2f05dcf6463d0eb9cc794ced15990fe9c78769df629e6c748f20b0bd91f1637aa92b1dc4a5925a5b7e292996f53a3114b3223da835576d43212f701c4e8745d0a866e2a4622cbae72aeccfeee2aaef4f3384692907b5892e5f23da2ea6b1e46c33d2c18d99b197bd7b86b99812692bcc7471498ef34de6a1d5500239f69b7473827af64d50bcb19829965af57ffe9705b65f643d1c74919f13e31211c4867262d29b17f244ddc3e4bd67455e0d4b1ab586e64056632cec666c2f5218c8f71aaa08a1a1bf0238517d3096166ef4592931286b7ae4fe726a9c570b23b7720e8c003a2d69bd3b54907becfebc044d94d179d685814fd3becd88f6715466e99062f6f75a5ccbc52c1e47ca3818fc7f80a7ce93e599fffdf23669d879b2a6512f7999577c3d4509b9e806f6ae716de7bd71d3cc972b4c1fcc0960a77238e072df8e092c0041e10112434c7e9400d0f0e438a4f0f4aacbd6b810cddad76daf0f74a78d9907ece052079ab94fee36c16487a44a2b047d70edf6153bda91ba575ed1198d0e68e02187442d6c5450956f82b529398d9004d8ed2e8c338b2897d7ddb6dbc1e57c22cd26c2d70b06bc9dd00d35f4cf17fbe373300c76b29040719dca5c1bcb035614f18b2af7d2b70b252ca62fa1574a77453b077cc1faabca7624450843c622ca6632e5c47b26fe86bf1779d9583ea5f5778a380f8b124f564ad4a16285a17a2a0c644f59d8a2f1bbbec70f974c1bc969bc003dc086be40a925cdd02fa791df2414f000519706984ac44b05bd34b8fa711b2218f8bbb4fbddfca78ea780e0fe77406211152bbc61c2425603bb10a72e4825a62e5accb66b7478d6df7af367a9cdebf108e572dc4727c583491f5e6e1502e74f7fbf7b29daffabc8b2c7014d7548c92202485294640427af928fe6ccb04c111678f4884e9bc56ce4f7c786d19f70346705a815b61f5a167a82cd050e454fa62982aff0372fe1ea4481f1a228a2d9897c25c7c9f2394ad88407f6298f3d4ce5073e72cbcd23b9451cc81ba323d241c595f8b814ea9006c0f523dd0dfa25870783a676648f0a1197839deb3b2adabce7bb67fbf3487a95b4571fbc180c87bb8070903cbf44d243d486be294155bd6b29be398f3db75457171927fa61cffd590913636bedee12bb02365a91bd6fe6632f5677a873a7b3b7e1493c5f21566680c61421de9e222eb6292be765b107018b13ead34ca196ef8470f7568648874d43cce9e33e4e4a56f9cd16b2c3b8b5eb5248f00867c572d84b6d9385249acde4a195e8ee0ca9fa079ce59a8e219912cdf12d1328bb4007e39c965dc92f6b77c64a3b0a1f1576f08e8d0a26ee295b9f16322ff9311c693f2566a34ecc263bcd2c1f4976733b02a383f3a13655208338f81d6e6c4c6bde201db928c7d2f15430b3d71ab2c484eba01328dd9eabfe9ef37748552e457e826b4ba8e1a5b992bb5326bd3018c8deae8488eb327fb43b881b629cac0c9a880f7650f7707bb660818ccd02a7303afa89e882ca7b5d216ac0849a648ceed7df92ec75d2d27c10b2d063645dee676602bbc3fdfd8b83acc1019c8073e4166efa8090ddec7e39c334817b71be8b50aa590be14014514127fd1827ab6133cd3a7b45e6951a45d2d3e77bb327067560e8c31bc04fd4f3fb3b060599452503a6fe1ac90abd4af3e8559ec8c85af3985c6df472ac7b5b7275d8bc971544b13b43ef92f2bd17531053454d9870a1fd82aeb9ad46433fd12e5515cd73b116f6424cbfc5cf66a8aba333c63bed34850933e661d5b97ae58a9d1f8f58c3f4a0e83e1f5bd93a0bfa29a25f6bb10ce4421d72d7de35b5b24c36ec63965bba5e2daf3955df91d1e7ce61703975decbc56848a4ea7e6655333095143996598354ce92989fe94fe51aee42c09e3b2f64e60ba2e733653b6e9cfe0c556f684cdcaa204c1956635a4b3558b254ab3fc4cd895700e375532d3e52d3b2733d62058a3ee69a7dc4e0e8115f38582e783b88cd1681b5749638286958a19751a06491566216565dec095b6ace78311e2f5b5c5c6b190c3a25859c3cf7c0e676da4d07a6ca536ede6ba90f8b6130ec52c8fb2144e558119b1f823ddc48", 0x1000, 0x6}, {&(0x7f0000001c00)="83c3eaed8a157e1f1f8eac65b47ab09b5852abde315968bfd7028d463254604ebb26b31d5ca1a2dc9c167be7664ffbcf8a3edcf35e34d1c9c89805509189c75022177117a3f44775db18ef85b98ad229e77e7626ac90e23555db7098c65af917c3e3d6b5f0565d8673ec595de62bea8a372be8455c24d4eff843cce06c9dda22db2e60d02cb1e7a6ba44e0b20f0224a003675064e13512ded4208b3209e6c7e03025030d7dfe62a48f4a442d2a9de39157418ecbb8bf6ad1932ab4b64fe3fc0c677a0da34c76ca15df2a7414615234f5babf05bec3efc41e68cc04b4cbf15df8dcdefe23a81f062c1ae43f20390ece831888debf88c5b4f0cc75822d7ac61348f0468cded59ac8247163fdb83eab92b12a8a384ad54e313f6ff481a8a0ba7f49e17e5652dc4c22737d22f6759bd11d28a8aebe0f8a50144e58f889f0bf23e710133c7a1fe2f1278ee11ca95895de2138f220991fd0513b8bb4ac47459a87fe833fddc0c3e5726049dd007fa45e01482e9ccd17bc16c510d86bfd8a78ed3eefde2b1f6a07a0365fe0ea22e52b4c1da9be64f9a138af626799f3f13143486abc82cdb2a0a6437306faac3591c4a8e8b28d4879c9ee8be45396d5255e7ec383203860eada2db407a484c0d6eb53f17f48e2180962400888e46713ec80e47cae2fde1506d95c211e3af9771b21aff490bfe650ddc17376d65e5900cc577c823f990d69b205a39f71d6142924a3fb69039329caa5bb2317fd0420c509b49d1cd001f4c880e7245431b900b7a012b104fd16eb62edb87cd779881a346498d0c3a378e77b178c2ab999dc757f444b52ece068cc6924d79aa220cd6f45c6866d6e94e1a5fbdc0d24354f715a196112fbc04b2356d6ebbbf21c4e32384c6b46b1f8bf4f03544fea735eb8a2adefe6e5f0c8e80e791d0712c93c72002878ef7277b4146eccd6d610452df6d843b2e376eace1a93a40043d84d3726a95bd51dce571fa2ff75701e2eba45e96ac6822e8245a9ae0d5763482f375288f69cc88cb657f0cba1231178da8ff2f02f9fabf39e8fe6a14e3245666bba9133fc0f1a024d2a96bb70ef0b53eb3f71d97aeda345fa811966d0f04ef77dbd630943693fdedbf3de6610faa4d8490899e213e34a391d16ef51c5bcb4ce3eab13195022ccbb55dea261f5f3c96010609bdda5a3fe7384d2df912690705ad615ef6e8aa8eb0172c51800295813f603ac346a443fd3437fc51801460b2f3327e373668ee04f9b0ab2b63f9404d42c3d983e3ec1af5a42e1e28216e7f8b2125f75c47207faa578d7a514b0f922b59826f5ba6301e14522470855d64c60ed70f5e19669818deff9291171cc9ed381c107bebf976f875c55c12d5967d09b4387db458055c1d6c40ca77084988d3877ce50d06db268e1bfadb803759a8a061db2b189f15a8a2390dc37e6faa3241be4e60caf2e972ea945acc6f5124849b869d5427624c56f4f1302c3be053a9e31db292532c5078e033f2a31cc7226482804071851907e4926cfcb1e9ac41e30dac38d2a60c94e13c73ded6b496e614746d18bd48736fa36a67056ef0611789f904375fe7587c582b4cc8efddbc8ab2af4fecf191baa398a0a4887e09b9519f50e8c17577c142c664681614d0eafcd2bf7f28ca81411c759f613f212a486fafd630f3e3c190fa0e8863ef0cac3857c7d63478c32c81687d347a8cb8fb69d377b473cfa952b3007c49bee01f5e95c942274be3db3230cf2d0bbf2a306baeca96a24eb2efb39fd2202b0bda9fd6f589211ab3f8a978d436ddae1d032246c17e36760dc2ef7df80ca9d3c0607c705018d47245fbd3443d5d7f304c61303e69811beb9d7978f88608e8cf17d96476d6d139102790b6078babca45690f6822298144a59a1de960b41bf1df51a6d5a043c135076402e47bb94c55e2ec98b170205df51539abccb4660b1e8daeb6ad8096de269ee88c033627eca2fc292a882db42d9a6cecc47d7b2fdbd1dd544669ecfed5ad6a9dccbc26b95644f3302d740ef6fa5c1f55703ed44f2b76a576998c5f236ad8a6dbee6542c879a48d388b0b6e3c3afd590594a3867325bc7a78a2791a7b8e343ab7a63dd0891bfe81337f8b4ab29f099f7a1fcd5f262cea12afdd38588d0d4a21d374ba4bfac051ca828954e112051b5c743667f51f1444f1f03183a7a43634354d1d20f8e4802578d35301938d1a060c8e6667bf3db445e4f5987405c4d68ad0241b2dc0fdd216550fe2406cb05fa4c09d0cadccd2a239d640448faf7bd221b680c53688865cce3aed2515454a7602f355c4ddd7653c26fa3da90812a4b4e97ba28dc33ef0bcf01fbdcae29de430c134417aef2f9690dcd6fedc474f5028a01aad5e598683147e4eda0620163ee1d349936072c8cbaa82c8d206e20af51b6eb92812c8a233e285ddaae599ed66ad53dcde3bd5bdbf10a4f1562858c7f8eeda4d3607266e3a0bd650f2e6ac326c1adf1cfc2d2dff235f80569758506647854e88b844910e6b9bbc4b51d10770c83ce37b15b7464b460948c5b98f358d48d9db4fc53752f96d9c48bf7eb92cfd7b1beab7f4f66fd3f950c9d468e2b1a75cdf4141f069a8a88e6ab0050f25f412d06b88c99303cebda32e0d123f9fb945e5e17a68c9368571f3b04056d9628b512da2583f8960432e8520208eab6995756e2ee848ff29091b34d46c635b6dd76193c09086e52b864947e97c17e91241b96f1d50e8d507726adb50e635d666fe70d0a4de4a3896cf0da274f3cfe5bfa663d763f9375c77ec3c05218d6f5183870268ea20a854f4c72ebd42602484587620cb9d4c3c68e171fdaa521cce2bde461ce5835bc701a372563a1be92aa76cd39b0809757ce9b853e7557842b0841b574750939493f8f718e039d23132e4de202adb90d3cf697b0a0ec4ea868140c4ed61c83632e0d478cdc62f1a06b151f7c3a87baf46a25e32c6e8ffe7d20d53e43d6436666ebb51bdb8cec5687d6fd2478e81201a8d5c4e4d4fb98e04f88fab8470cb5b013dee9f213b948648b240986d0a3f8751d7954caa5927aeaa98f3e1acfd128f643b76bf66e846df8ab961fbdf73ac481ea0b49212fc842b5e4e8bfa397ef21913ddedf572c4551d1527267a66066a52f25b5f1f6f1f456a60bfd0e50af4f0e9da574f0c3a5f41682c1bcb1869a63bb74255d3362833c7ebbd522dff76e65a518cd19db74811088e77390b9a732da645959df9256b39f56ab85ab320c773027cdb5308dd6c712f91e83124c766164c52cf5ccca6c1994cc2bfbfec187ecb96d83f7db20b3f38b92f69dbeca9a99ce650a27368e80ad6f7d1f57b09a7fe2a2fb35acc42df8c31fa48804e7955a45a74f984ef16fff2cc245a71b3df30e9b846be03859313848895b2d6caa21ee101c9a52640f325f22a9930def820f9b55a855b6209dc8bbc8e5278788ef1e6934449e1c0a62bd0580f66a18f8fc887fff24407d0e833c850d0afa228707e1ba38f54d3937c97247af4b8056d7c008905b7241cab31d4bf528da4659aff5b4a7a80631fd223567815458425d49f7728efcb49fc57d94b0ebc717ba167d54b3031305567a265a69529b2fc6974ad0f6298e3fe4b13efd68fe478ec7a5e884062d73b4a667612bf80c99876412f4782b84e688f368367b1c17de0569f32d444348e9f8734147bd6a37d2cd31b3c3807caffc68269ac69851c6a511103cb2012667b99223928c7b60b237397629b40c284bcfbbb188e28e80e08d2f6069ba498ad610493d791c2ef1e1d935d7049581b76fc52da0fd817257be3c849b347905a28cd6dd6349214681f52a58e4a5a85e2e623f77ab0508c07e99926c4cf2eff62000671125e852d2671181a5ea49aa81bf29c7eda6611721bc8601f8af0b7ae046d93353e85f4308e8f187a3c5f0e9ed0f8379d0fc75b48d2bd505c150edf368b46ac9c1358ad1c6b6dfb309cd9ffe3cf84bf23596945905b29597ed01180ab277578f346f09662ff35af29d35d2a3f7d5b67d82514cdb51ee9d01b00a26cea6fec5e7a2fd19c56add9f535cc03f150d3cb2ae8f10405a2232eb485bb5a4437d27ae8961c1807a58ee0465fcbc96e7e40e9d98e160d9c2195127c43057f93b00838ab095e8a755adfa9a755a5b5b677cd076907dcc34543ce2e46d6b2b75c3601c503d2a37c8340ff3042db9a4f2e51485842fd1120f0e4e3f4514cee0e88c3eb974098e10faf677c0ab5bd714672fe204bc84d2f15e42840bb09addd256f4cb70cf4662400a714a80de3094059f8e8a7c9c81880a09fd0cc3b1d6af2b4ee0075643c818ed07d87293abcb70da49ea7ce7b48e093e440d0d4cc3eaae2c54a6dff73141406ece5ecb4d62e11843d8d81242d2cad1fe2227b2241b3439f7e4c7579f7dbcaf7f738143d242f6430e531d4134fb7987677aad7555a5b70e723d93c9104fb8040a379ac474ce1b0ef3ff753aa6b6ee6d12ff7de35636922da2a51aee1282523f48c204bb26ebaf29424c7266856a13a3fd1f2271c4d99fde4e89a0aac5ba6f03bf14f2be74b4b29e1feff53f0f18b964c5fd6085d599163ef656f40b7c3e1752639e8b6e00767f8af895f5b589882fbb17f28877584ddbbb40ceb1bab91406c24b0e8d3366e4e572e268d7ac3b35fce660c17dc808bc63cbc97fa430165279e4d22b507e02ed09bb54d3ac0e6a96bb731df6c7560b25181863c9400a7c4fc5b4f19117741fce69d5f7d7d66509bf1fe7a286ef1a524e5a9024bdb81fec7625b230422b0fa4acbefa29e0d2d7da184eb8243301ad18d804473001bcd2abfdbdaf113841645509ae84ad717a8c1402854f98633d4d590cbb1c27fdb2ec9136ea5d76792f703e49d3c800469cefa48f04a38b2413f259279bba4f10f2702c6d0c10bcc28900111836601e6496dc5d734a7f431a3624aabd106743626d1dee98797be440564f8a3b95d3d4dd3b02a91420782b26b8dd96c5a6d684339678403a1d18626d9f8312cea83617a74b82314992d2f7a04b6f18d35011e7a5c8f4fd795f34ae94d170cd367607beae9329b546238bf4e1798fc417bceaa3e11165827325cc6e146e870266fc2c8092ac44c70121b71234152225b9ab3b2beca346354f215ff213d06ff982e36030b34834bb6eff30bb2d4eefc17a5be94809e8291ba3313cc0fca59458e449de911b7ea4863a07fbf41e468d2740b7dbd9545172be5543f31df62f8ab03a25fef40010f4be5b07e8809e2c538c7282caacc89d3b6d613e83170d67e635506aaa0e6c51276ca6f5738a6a38dfa5c927a99eb22da62b157854b7dedeabf2c5cc0367b89d13d3dc068c7b6124ad851c693878eecc4d85fb53693a30e1dec846efe922f69a1be253dd1b3784df645db2adf6c0b752103da04d51e7e95ec024cb726f01dde5d70cb6dd25320f19a709e3746c5db2ba1068cc98862a80507a0543a1b48099969beeb22f3dbef78bc6d5dd223dfb314d6659cdc36dc5a0687b070a2b8da40398de7b313582216fdbd82c5c4dacdfd4e45e863453d15b0cac51dccb36afbdf41852bfd7174e328753b1b971fdaca8d125faf44beef98c0b93655b9015afb2afb95a32dd3ce5790d1181d80acb4abcac1ffc6be40e382aacaed0004b6dacab7f9f7854bb1a63b718ba80be39979baccb3ffd24295506accbce8de8544ed51a193e42a9b06411b8f42c37b7ade1f4001aa52f4abd397d05aad262f659e5697e15de70dd899fdf8d4e223b0664013efa1567c788ee639addc085f17d9312cb5a5693b0848720906b1d0e097e", 0x1000}, {&(0x7f0000002c00)="708631c266885fa4e29fb6484a98b564248945c4ade35de740ac1a26e81611d7d50cca91aa5e7a9e957d143ae546b47eafeba0bb0d110f814f581c13336cf79558db66e416f2e0a80ea2630c5b73fe99a4a9c047b3d59b706899b5d991ce5a9ac6e5a38562a00f5617b69d7d3f5415ecfb1503012da22eb81e07cc419c55f5eeaa543d2ef84a7d0a04bb6bfbfd04e0db6a6a15ca65799b6f4a5b34b5b693a8ba1b85f7da605dad1365081728b62a70c5372c254a25f259f6cda02f27296b8cfc97eda48208e77fdc72ddacd5f4100e648b52a5", 0xd3, 0x3}, {&(0x7f0000002d00)="2492311b504bd21c0db7edf535578b700f0fab4c3cd36d7e62ee0516a02abaa53db17d88fcbfc6fcdcd76f49c800ce4a389a6f6f81cdaf7713ac238a36e4c04bd72f3716e63a6078f27ff48fc2262d2f963d1c8331f32ab32701168ac3d8504274d4f13757f11ffc3d87a46bd1344cc2c71df11844044b3600", 0x79, 0x4}], 0x380a040, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x1ff, 0x2, &(0x7f0000000180)=[{&(0x7f0000000080)="5ec50d3257e697351e0dced042b5a8721db03c6e7bc2", 0x16, 0x5}, {&(0x7f0000002e80)="7e1ad27d8877b972a4f050be7f5b1bbdc28744c64f16a3b4f7a74de2a6904fbc8e540d17558fe3cd27f09a06f4000cb6779a7853102083790e64f7c7b81a0c094ded16c55db258f17c21f2d200762e1cf8383b8fe1e9e4b9de8f5fecc9dd82c8ed1ff9d1b52d5159bb8cbb4bc3e8e39cf5c8624ce4c09a1b57c80b0b37e2c5a1bd3980989494247c7d45f4f001518f8dbdb91c8e25623fe124ea613136674e260abcc40a0c0342099e355368", 0xac, 0x5e869bcf}], 0x222040c, &(0x7f00000001c0)=ANY=[@ANYBLOB="737562722ca394d3d155692331"]) mkdir(&(0x7f0000000280)='./file0\x00', 0x80) chroot(&(0x7f0000000040)='./file0\x00') r1 = syz_open_dev$audion(&(0x7f0000000340)='/dev/audio#\x00', 0x4, 0x40000) readv(r1, &(0x7f00000005c0)=[{&(0x7f0000000380)=""/67, 0x43}, {&(0x7f0000000400)}, {&(0x7f0000000440)=""/65, 0x41}, {&(0x7f00000004c0)}, {&(0x7f0000000500)=""/160, 0xa0}], 0x5) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x80000, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f00000006c0), &(0x7f0000000700)=0xc) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000300)={0x4, 0x5, 0x2, 0x7f}, 0x8) 00:27:20 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x801000cf, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1369.696554] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] 00:27:20 executing program 3 (fault-call:0 fault-nth:19): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") [ 1369.769545] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:27:21 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x3) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000140)="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", 0x101, 0x0, &(0x7f000005ffe4)={0xa, 0x40000000004e23, 0x0, @dev={0xfe, 0x80, [], 0x1c}}, 0x1c) sendto$inet6(r1, &(0x7f0000000000)="de", 0x1, 0x0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @local, 0x100000001}, 0x1c) chmod(&(0x7f0000000040)='./file0\x00', 0x8) [ 1369.822361] FAULT_INJECTION: forcing a failure. [ 1369.822361] name failslab, interval 1, probability 0, space 0, times 0 [ 1369.852009] CPU: 1 PID: 4600 Comm: syz-executor3 Not tainted 4.19.0-rc6+ #269 [ 1369.859302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1369.859309] Call Trace: [ 1369.859354] dump_stack+0x1c4/0x2b4 [ 1369.874903] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1369.880106] ? is_bpf_text_address+0xd3/0x170 [ 1369.884616] should_fail.cold.4+0xa/0x17 [ 1369.888703] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1369.893835] ? save_stack+0xa9/0xd0 [ 1369.897470] ? save_stack+0x43/0xd0 [ 1369.901101] ? kasan_kmalloc+0xc7/0xe0 [ 1369.905001] ? kmem_cache_alloc_trace+0x152/0x750 [ 1369.909848] ? kobject_uevent_env+0x2f3/0x101e [ 1369.914433] ? kobject_uevent+0x1f/0x24 [ 1369.918418] ? lo_ioctl+0x138e/0x1d80 [ 1369.922238] ? blkdev_ioctl+0x9ac/0x2010 [ 1369.926312] ? block_ioctl+0xee/0x130 [ 1369.930116] ? do_vfs_ioctl+0x1de/0x1720 [ 1369.934207] ? ksys_ioctl+0xa9/0xd0 [ 1369.934222] ? __x64_sys_ioctl+0x73/0xb0 [ 1369.934238] ? do_syscall_64+0x1b9/0x820 [ 1369.934260] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1369.951342] ? fs_reclaim_acquire+0x20/0x20 [ 1369.955703] ? lock_downgrade+0x900/0x900 [ 1369.959864] ? ___might_sleep+0x1ed/0x300 [ 1369.964025] ? arch_local_save_flags+0x40/0x40 [ 1369.968607] ? kasan_check_read+0x11/0x20 [ 1369.972761] ? do_raw_spin_unlock+0xa7/0x2f0 [ 1369.977186] __should_failslab+0x124/0x180 [ 1369.977227] should_failslab+0x9/0x14 [ 1369.977247] __kmalloc+0x2d4/0x760 [ 1369.988845] ? kobject_get_path+0xc2/0x1b0 [ 1369.993089] ? kmem_cache_alloc_trace+0x31f/0x750 [ 1369.997974] kobject_get_path+0xc2/0x1b0 [ 1370.002041] kobject_uevent_env+0x314/0x101e [ 1370.002053] ? kasan_check_write+0x14/0x20 [ 1370.002074] kobject_uevent+0x1f/0x24 [ 1370.002091] lo_ioctl+0x138e/0x1d80 [ 1370.002111] ? lo_rw_aio_complete+0x470/0x470 [ 1370.002141] blkdev_ioctl+0x9ac/0x2010 [ 1370.002158] ? blkpg_ioctl+0xc10/0xc10 [ 1370.002172] ? lock_downgrade+0x900/0x900 [ 1370.002210] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1370.010840] ? save_stack+0x43/0xd0 [ 1370.010853] ? __kasan_slab_free+0x102/0x150 [ 1370.010873] ? __fget+0x4d1/0x740 [ 1370.010893] ? ksys_dup3+0x680/0x680 [ 1370.010908] ? kasan_check_write+0x14/0x20 [ 1370.010929] block_ioctl+0xee/0x130 [ 1370.010945] ? blkdev_fallocate+0x400/0x400 [ 1370.010971] do_vfs_ioctl+0x1de/0x1720 00:27:21 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xfc000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1370.010993] ? trace_hardirqs_on+0xbd/0x310 [ 1370.018662] ? ioctl_preallocate+0x300/0x300 [ 1370.018678] ? __fget_light+0x2e9/0x430 [ 1370.018693] ? fget_raw+0x20/0x20 [ 1370.018707] ? putname+0xf2/0x130 [ 1370.018723] ? kmem_cache_free+0x21a/0x290 [ 1370.018737] ? putname+0xf7/0x130 [ 1370.018755] ? do_sys_open+0x3ac/0x700 [ 1370.018775] ? security_file_ioctl+0x94/0xc0 [ 1370.018792] ksys_ioctl+0xa9/0xd0 [ 1370.018811] __x64_sys_ioctl+0x73/0xb0 [ 1370.027179] do_syscall_64+0x1b9/0x820 00:27:21 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xfe80000000000000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1370.027220] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1370.027252] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1370.027269] ? trace_hardirqs_on_caller+0x310/0x310 [ 1370.027284] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1370.027325] ? recalc_sigpending_tsk+0x180/0x180 [ 1370.027338] ? kasan_check_write+0x14/0x20 [ 1370.027368] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1370.027385] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1370.027402] RIP: 0033:0x4573e7 [ 1370.035473] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1370.035481] RSP: 002b:00007ff838176a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1370.035502] RAX: ffffffffffffffda RBX: 0000000020000150 RCX: 00000000004573e7 [ 1370.044906] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1370.044915] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1370.044923] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1370.044931] R13: 0000000000000000 R14: 00000000004d7ef0 R15: 0000000000000003 [ 1370.096087] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1370.217389] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1370.232237] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:27:21 executing program 3 (fault-call:0 fault-nth:20): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") [ 1370.324749] FAULT_INJECTION: forcing a failure. [ 1370.324749] name failslab, interval 1, probability 0, space 0, times 0 [ 1370.347443] CPU: 1 PID: 4623 Comm: syz-executor3 Not tainted 4.19.0-rc6+ #269 [ 1370.354768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1370.364158] Call Trace: [ 1370.366777] dump_stack+0x1c4/0x2b4 [ 1370.370426] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1370.375646] should_fail.cold.4+0xa/0x17 [ 1370.379719] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1370.384836] ? mark_held_locks+0x130/0x130 [ 1370.389085] ? lock_release+0x970/0x970 [ 1370.393095] ? arch_local_save_flags+0x40/0x40 [ 1370.398173] ? fs_reclaim_acquire+0x20/0x20 [ 1370.402526] ? lock_downgrade+0x900/0x900 [ 1370.406687] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1370.412241] ? ___might_sleep+0x1ed/0x300 [ 1370.416404] ? put_dec+0x3b/0xf0 [ 1370.419787] ? arch_local_save_flags+0x40/0x40 [ 1370.424387] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1370.429936] ? number+0x972/0xca0 [ 1370.433425] __should_failslab+0x124/0x180 [ 1370.437677] should_failslab+0x9/0x14 [ 1370.441490] kmem_cache_alloc_node+0x26e/0x730 [ 1370.446081] ? set_precision+0xe0/0xe0 [ 1370.449996] __alloc_skb+0x119/0x770 [ 1370.453727] ? skb_scrub_packet+0x490/0x490 [ 1370.458067] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1370.463866] ? pointer+0x990/0x990 [ 1370.467421] ? device_get_devnode+0x2d0/0x2d0 [ 1370.471928] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1370.476995] ? netlink_has_listeners+0x2cb/0x4a0 [ 1370.481771] ? netlink_tap_init_net+0x3d0/0x3d0 [ 1370.486455] alloc_uevent_skb+0x84/0x1da [ 1370.490530] kobject_uevent_env+0xa52/0x101e [ 1370.494945] ? kasan_check_write+0x14/0x20 [ 1370.499216] kobject_uevent+0x1f/0x24 [ 1370.503034] lo_ioctl+0x138e/0x1d80 [ 1370.506681] ? lo_rw_aio_complete+0x470/0x470 [ 1370.511208] blkdev_ioctl+0x9ac/0x2010 [ 1370.515117] ? blkpg_ioctl+0xc10/0xc10 [ 1370.519017] ? finish_task_switch+0x1f5/0x900 [ 1370.523518] ? finish_task_switch+0x1b5/0x900 [ 1370.528021] ? __switch_to_asm+0x34/0x70 [ 1370.532090] ? preempt_notifier_register+0x200/0x200 [ 1370.537219] ? __switch_to_asm+0x34/0x70 [ 1370.541290] ? __switch_to_asm+0x34/0x70 [ 1370.541304] ? __switch_to_asm+0x40/0x70 [ 1370.541322] ? __switch_to_asm+0x34/0x70 [ 1370.549441] ? __switch_to_asm+0x40/0x70 [ 1370.557550] ? __switch_to_asm+0x34/0x70 [ 1370.557561] ? __switch_to_asm+0x40/0x70 [ 1370.557570] ? __switch_to_asm+0x34/0x70 [ 1370.557583] ? __switch_to_asm+0x34/0x70 [ 1370.557594] ? __switch_to_asm+0x40/0x70 [ 1370.557612] ? __switch_to_asm+0x34/0x70 [ 1370.581897] ? __switch_to_asm+0x40/0x70 [ 1370.585967] ? __switch_to_asm+0x34/0x70 [ 1370.590026] ? __switch_to_asm+0x40/0x70 [ 1370.594093] ? __schedule+0x874/0x1ed0 [ 1370.597990] ? __sched_text_start+0x8/0x8 [ 1370.602137] ? trace_hardirqs_off+0x310/0x310 [ 1370.606636] ? trace_hardirqs_on+0x310/0x310 [ 1370.611053] block_ioctl+0xee/0x130 [ 1370.614684] ? blkdev_fallocate+0x400/0x400 [ 1370.619012] do_vfs_ioctl+0x1de/0x1720 [ 1370.622898] ? trace_hardirqs_off+0x310/0x310 [ 1370.627396] ? retint_kernel+0x1b/0x2d [ 1370.631289] ? ioctl_preallocate+0x300/0x300 [ 1370.635705] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1370.640462] ? trace_hardirqs_off+0xaf/0x310 [ 1370.644873] ? retint_kernel+0x2d/0x2d [ 1370.648766] ? ksys_ioctl+0x62/0xd0 [ 1370.652398] ksys_ioctl+0xa9/0xd0 [ 1370.655856] __x64_sys_ioctl+0x73/0xb0 [ 1370.659746] do_syscall_64+0x1b9/0x820 [ 1370.664329] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1370.669696] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1370.674632] ? trace_hardirqs_on_caller+0x310/0x310 [ 1370.679648] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1370.684665] ? recalc_sigpending_tsk+0x180/0x180 [ 1370.689423] ? kasan_check_write+0x14/0x20 [ 1370.693661] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1370.698508] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1370.703697] RIP: 0033:0x4573e7 [ 1370.706896] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1370.725797] RSP: 002b:00007ff838176a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1370.733509] RAX: ffffffffffffffda RBX: 0000000020000150 RCX: 00000000004573e7 [ 1370.740786] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1370.748052] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1370.755315] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1370.762579] R13: 0000000000000000 R14: 00000000004d7ef0 R15: 0000000000000003 [ 1370.800105] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1370.879381] device bridge_slave_1 left promiscuous mode [ 1370.887024] bridge0: port 2(bridge_slave_1) entered disabled state [ 1370.935063] device bridge_slave_0 left promiscuous mode [ 1370.940510] bridge0: port 1(bridge_slave_0) entered disabled state [ 1370.977882] team0 (unregistering): Port device team_slave_1 removed [ 1370.986478] team0 (unregistering): Port device team_slave_0 removed [ 1370.995527] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1371.037027] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1371.105214] bond0 (unregistering): Released all slaves [ 1371.266036] bridge0: port 1(bridge_slave_0) entered blocking state [ 1371.272491] bridge0: port 1(bridge_slave_0) entered disabled state [ 1371.279716] device bridge_slave_0 entered promiscuous mode [ 1371.303697] bridge0: port 2(bridge_slave_1) entered blocking state [ 1371.310284] bridge0: port 2(bridge_slave_1) entered disabled state [ 1371.324840] device bridge_slave_1 entered promiscuous mode [ 1371.358846] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1371.393382] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1371.498417] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1371.535753] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1371.700322] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1371.707635] team0: Port device team_slave_0 added [ 1371.733279] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1371.740503] team0: Port device team_slave_1 added [ 1371.763014] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1371.787587] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1371.825577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1371.854233] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1372.070913] bridge0: port 2(bridge_slave_1) entered blocking state [ 1372.077306] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1372.083941] bridge0: port 1(bridge_slave_0) entered blocking state [ 1372.090288] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1372.795057] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1372.863556] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1372.934780] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1372.940881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1372.948273] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1373.014849] 8021q: adding VLAN 0 to HW filter on device team0 00:27:24 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x3f000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:27:24 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0xfeffffff, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:27:24 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x32040000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:27:24 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0x6000]}, 0x10) 00:27:24 executing program 3 (fault-call:0 fault-nth:21): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:27:24 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x7, 0x101000) r2 = openat(r1, &(0x7f0000000000)='./file0\x00', 0x640240, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f0000000040)=0xbff3) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f0000294f74)="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", 0xfc) fcntl$getflags(r2, 0x3) ioctl$KVM_S390_INTERRUPT_CPU(r2, 0x4010ae94, &(0x7f00000000c0)={0x0, 0xc69e, 0xfffffffffffffff8}) [ 1373.452186] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1373.469900] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. [ 1373.481796] FAULT_INJECTION: forcing a failure. [ 1373.481796] name failslab, interval 1, probability 0, space 0, times 0 [ 1373.487414] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. [ 1373.521203] CPU: 1 PID: 4894 Comm: syz-executor3 Not tainted 4.19.0-rc6+ #269 [ 1373.523423] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1373.528517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1373.528524] Call Trace: [ 1373.528554] dump_stack+0x1c4/0x2b4 [ 1373.528581] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1373.559625] ? lock_downgrade+0x900/0x900 [ 1373.563798] should_fail.cold.4+0xa/0x17 [ 1373.567877] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1373.572993] ? rcu_bh_qs+0xc0/0xc0 [ 1373.576543] ? unwind_dump+0x190/0x190 [ 1373.580449] ? is_bpf_text_address+0xd3/0x170 [ 1373.584963] ? __kernel_text_address+0xd/0x40 [ 1373.589486] ? unwind_get_return_address+0x61/0xa0 [ 1373.594432] ? __save_stack_trace+0x8d/0xf0 [ 1373.598775] ? fs_reclaim_acquire+0x20/0x20 [ 1373.603115] ? lock_downgrade+0x900/0x900 [ 1373.607284] ? ___might_sleep+0x1ed/0x300 [ 1373.611447] ? kobject_uevent+0x1f/0x24 [ 1373.615434] ? arch_local_save_flags+0x40/0x40 [ 1373.620058] ? do_vfs_ioctl+0x1de/0x1720 [ 1373.624133] ? ksys_ioctl+0xa9/0xd0 [ 1373.627773] ? __x64_sys_ioctl+0x73/0xb0 [ 1373.631849] ? do_syscall_64+0x1b9/0x820 [ 1373.635928] ? fs_reclaim_acquire+0x20/0x20 [ 1373.640268] __should_failslab+0x124/0x180 [ 1373.644515] should_failslab+0x9/0x14 [ 1373.648333] kmem_cache_alloc+0x2be/0x730 [ 1373.652505] skb_clone+0x1bb/0x500 [ 1373.656061] ? skb_split+0x11e0/0x11e0 [ 1373.659965] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1373.665000] ? netlink_trim+0x1b4/0x380 [ 1373.668992] ? netlink_skb_destructor+0x210/0x210 [ 1373.673853] netlink_broadcast_filtered+0x110f/0x1680 [ 1373.679065] ? __netlink_sendskb+0xd0/0xd0 [ 1373.683319] ? pointer+0x990/0x990 [ 1373.686877] ? device_get_devnode+0x2d0/0x2d0 [ 1373.691385] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1373.696931] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 1373.702405] ? refcount_add_not_zero_checked+0x330/0x330 [ 1373.707869] ? netlink_has_listeners+0x2cb/0x4a0 [ 1373.712640] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1373.717674] netlink_broadcast+0x3a/0x50 00:27:24 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x5000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1373.721748] kobject_uevent_env+0xa83/0x101e [ 1373.726162] ? kasan_check_write+0x14/0x20 [ 1373.730421] kobject_uevent+0x1f/0x24 [ 1373.734243] lo_ioctl+0x138e/0x1d80 [ 1373.737890] ? lo_rw_aio_complete+0x470/0x470 [ 1373.742388] blkdev_ioctl+0x9ac/0x2010 [ 1373.746266] ? blkpg_ioctl+0xc10/0xc10 [ 1373.750138] ? lock_downgrade+0x900/0x900 [ 1373.754275] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1373.760072] ? save_stack+0x43/0xd0 [ 1373.763702] ? __kasan_slab_free+0x102/0x150 [ 1373.768103] ? __fget+0x4d1/0x740 [ 1373.771544] ? ksys_dup3+0x680/0x680 [ 1373.775256] ? kasan_check_write+0x14/0x20 [ 1373.779514] block_ioctl+0xee/0x130 [ 1373.783150] ? blkdev_fallocate+0x400/0x400 [ 1373.787478] do_vfs_ioctl+0x1de/0x1720 [ 1373.791384] ? trace_hardirqs_on+0xbd/0x310 [ 1373.795720] ? ioctl_preallocate+0x300/0x300 [ 1373.800144] ? __fget_light+0x2e9/0x430 [ 1373.804128] ? fget_raw+0x20/0x20 [ 1373.807592] ? putname+0xf2/0x130 [ 1373.811076] ? kmem_cache_free+0x21a/0x290 [ 1373.815324] ? putname+0xf7/0x130 [ 1373.818793] ? do_sys_open+0x3ac/0x700 [ 1373.822700] ? security_file_ioctl+0x94/0xc0 [ 1373.827124] ksys_ioctl+0xa9/0xd0 [ 1373.830594] __x64_sys_ioctl+0x73/0xb0 [ 1373.834499] do_syscall_64+0x1b9/0x820 [ 1373.838401] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1373.843781] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1373.848724] ? trace_hardirqs_on_caller+0x310/0x310 [ 1373.853759] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1373.858789] ? recalc_sigpending_tsk+0x180/0x180 [ 1373.863558] ? kasan_check_write+0x14/0x20 [ 1373.867812] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1373.872675] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1373.877873] RIP: 0033:0x4573e7 [ 1373.881079] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1373.899980] RSP: 002b:00007ff838176a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1373.907673] RAX: ffffffffffffffda RBX: 0000000020000150 RCX: 00000000004573e7 [ 1373.914925] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 00:27:25 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xff0f0000, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 1373.922179] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1373.929441] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1373.936696] R13: 0000000000000000 R14: 00000000004d7ef0 R15: 0000000000000003 [ 1373.950111] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1373.962318] net_ratelimit: 1 callbacks suppressed 00:27:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f00000001c0)=0x9, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$rds(r0, &(0x7f0000000200)={0x2, 0x4e22}, 0x10) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) listen(r0, 0x800) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) setsockopt$inet_opts(r2, 0x0, 0x9, &(0x7f0000000080)="9b2c9e291cf1573795c86072036f3faed921e32bf66d904d19c0e40b4cb87e782af27d199d5784cfdc3ed61d661136552a6798e11ffcace6633156fc50e1214115c34d1eb81dea6808b45b8c1cd94237e14541bbcef39714363e5e26cdc42a4eb6a16f97352533563d6012ba8f80cf7f83e0fcddc9e873ba35c251c368216b3df152e976a1a08ab68cbf7c9c0b06cfca003620cf3a01157973ce64d0a1aa48211ee3fe29289332e4403cb068459e09aec0a7b2d563645ac850", 0xb9) sched_setscheduler(0x0, 0x5, &(0x7f0000000000)) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) 00:27:25 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80284504, &(0x7f0000000040)={0x2ff, 0x0, 0x0, 0x0, "272ab56aef61a94a7feefa3ccfaf112530c73ee00da7a5355f67bf191c15a58f"}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x2, 0x84d00) setns(r1, 0x40000000) [ 1373.962338] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:27:25 executing program 3 (fault-call:0 fault-nth:22): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") [ 1374.064069] FAULT_INJECTION: forcing a failure. [ 1374.064069] name failslab, interval 1, probability 0, space 0, times 0 [ 1374.078788] CPU: 1 PID: 4920 Comm: syz-executor3 Not tainted 4.19.0-rc6+ #269 [ 1374.086082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1374.095434] Call Trace: [ 1374.098042] dump_stack+0x1c4/0x2b4 [ 1374.101684] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1374.106886] ? lock_downgrade+0x900/0x900 [ 1374.111073] should_fail.cold.4+0xa/0x17 [ 1374.115148] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1374.120736] ? rcu_bh_qs+0xc0/0xc0 [ 1374.124285] ? unwind_dump+0x190/0x190 [ 1374.128200] ? is_bpf_text_address+0xd3/0x170 [ 1374.132709] ? __kernel_text_address+0xd/0x40 [ 1374.137216] ? unwind_get_return_address+0x61/0xa0 [ 1374.142161] ? __save_stack_trace+0x8d/0xf0 [ 1374.146512] ? fs_reclaim_acquire+0x20/0x20 [ 1374.150843] ? lock_downgrade+0x900/0x900 [ 1374.155000] ? ___might_sleep+0x1ed/0x300 [ 1374.159152] ? kobject_uevent+0x1f/0x24 [ 1374.163140] ? arch_local_save_flags+0x40/0x40 [ 1374.167726] ? do_vfs_ioctl+0x1de/0x1720 [ 1374.171792] ? ksys_ioctl+0xa9/0xd0 [ 1374.175425] ? __x64_sys_ioctl+0x73/0xb0 [ 1374.179497] ? do_syscall_64+0x1b9/0x820 [ 1374.183565] ? fs_reclaim_acquire+0x20/0x20 [ 1374.187900] __should_failslab+0x124/0x180 [ 1374.192142] should_failslab+0x9/0x14 [ 1374.195966] kmem_cache_alloc+0x2be/0x730 [ 1374.200132] skb_clone+0x1bb/0x500 [ 1374.203684] ? skb_split+0x11e0/0x11e0 [ 1374.207577] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1374.212601] ? netlink_trim+0x1b4/0x380 [ 1374.216612] ? netlink_skb_destructor+0x210/0x210 [ 1374.221469] netlink_broadcast_filtered+0x110f/0x1680 [ 1374.226677] ? __netlink_sendskb+0xd0/0xd0 [ 1374.230925] ? pointer+0x990/0x990 [ 1374.234487] ? device_get_devnode+0x2d0/0x2d0 [ 1374.238993] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1374.244542] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 1374.250004] ? refcount_add_not_zero_checked+0x330/0x330 [ 1374.255466] ? netlink_has_listeners+0x2cb/0x4a0 [ 1374.260235] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1374.265265] netlink_broadcast+0x3a/0x50 [ 1374.269345] kobject_uevent_env+0xa83/0x101e [ 1374.273761] ? kasan_check_write+0x14/0x20 [ 1374.278009] kobject_uevent+0x1f/0x24 [ 1374.281821] lo_ioctl+0x138e/0x1d80 [ 1374.285468] ? lo_rw_aio_complete+0x470/0x470 [ 1374.289981] blkdev_ioctl+0x9ac/0x2010 [ 1374.293878] ? blkpg_ioctl+0xc10/0xc10 [ 1374.297775] ? lock_downgrade+0x900/0x900 [ 1374.301936] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1374.307750] ? save_stack+0x43/0xd0 [ 1374.311380] ? __kasan_slab_free+0x102/0x150 [ 1374.315800] ? __fget+0x4d1/0x740 [ 1374.319264] ? ksys_dup3+0x680/0x680 [ 1374.322991] ? kasan_check_write+0x14/0x20 [ 1374.327241] block_ioctl+0xee/0x130 [ 1374.330871] ? blkdev_fallocate+0x400/0x400 [ 1374.335208] do_vfs_ioctl+0x1de/0x1720 [ 1374.339105] ? trace_hardirqs_on+0xbd/0x310 [ 1374.343435] ? ioctl_preallocate+0x300/0x300 [ 1374.347854] ? __fget_light+0x2e9/0x430 [ 1374.351838] ? fget_raw+0x20/0x20 [ 1374.355300] ? putname+0xf2/0x130 [ 1374.358763] ? kmem_cache_free+0x21a/0x290 [ 1374.363000] ? putname+0xf7/0x130 [ 1374.366463] ? do_sys_open+0x3ac/0x700 [ 1374.370363] ? security_file_ioctl+0x94/0xc0 [ 1374.374782] ksys_ioctl+0xa9/0xd0 [ 1374.378246] __x64_sys_ioctl+0x73/0xb0 [ 1374.382145] do_syscall_64+0x1b9/0x820 [ 1374.386039] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1374.391409] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1374.396346] ? trace_hardirqs_on_caller+0x310/0x310 [ 1374.401373] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1374.406400] ? recalc_sigpending_tsk+0x180/0x180 [ 1374.411162] ? kasan_check_write+0x14/0x20 [ 1374.415420] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1374.420274] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1374.425465] RIP: 0033:0x4573e7 [ 1374.428671] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1374.447573] RSP: 002b:00007ff838176a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1374.455286] RAX: ffffffffffffffda RBX: 0000000020000150 RCX: 00000000004573e7 00:27:25 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000380)="f2", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local, [0x0, 0x2c01]}, 0x10) [ 1374.462558] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1374.469831] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1374.477105] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1374.484379] R13: 0000000000000000 R14: 00000000004d7ef0 R15: 0000000000000003 [ 1374.496131] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] 00:27:25 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x3f000000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:27:25 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f433408"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x734d0400, @empty={[0xe00000002000000, 0x1600, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 00:27:25 executing program 3 (fault-call:0 fault-nth:23): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") [ 1374.536970] IPVS: wrr: SCTP 172.20.20.170:0 - no destination available [ 1374.618233] FAULT_INJECTION: forcing a failure. [ 1374.618233] name failslab, interval 1, probability 0, space 0, times 0 [ 1374.622740] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1374.648495] CPU: 1 PID: 4931 Comm: syz-executor3 Not tainted 4.19.0-rc6+ #269 [ 1374.655795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1374.665147] Call Trace: [ 1374.667748] dump_stack+0x1c4/0x2b4 [ 1374.671383] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1374.676580] ? lo_ioctl+0xe6/0x1d80 [ 1374.680223] should_fail.cold.4+0xa/0x17 [ 1374.684290] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1374.689394] ? blkpg_ioctl+0xc10/0xc10 [ 1374.693283] ? lock_downgrade+0x900/0x900 [ 1374.697437] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1374.703241] ? save_stack+0x43/0xd0 [ 1374.706863] ? __kasan_slab_free+0x102/0x150 [ 1374.711274] ? __fget+0x4d1/0x740 [ 1374.714735] ? fs_reclaim_acquire+0x20/0x20 [ 1374.719059] ? lock_downgrade+0x900/0x900 [ 1374.723218] ? ___might_sleep+0x1ed/0x300 [ 1374.727369] ? arch_local_save_flags+0x40/0x40 [ 1374.731960] ? block_ioctl+0xee/0x130 [ 1374.735767] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1374.741323] __should_failslab+0x124/0x180 [ 1374.745562] should_failslab+0x9/0x14 [ 1374.749362] kmem_cache_alloc+0x2be/0x730 [ 1374.753509] ? fget_raw+0x20/0x20 [ 1374.756972] getname_flags+0xd0/0x5a0 [ 1374.760775] do_mkdirat+0xc5/0x310 [ 1374.764319] ? __ia32_sys_mknod+0xb0/0xb0 [ 1374.768466] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1374.773837] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1374.779290] ? ksys_ioctl+0x81/0xd0 [ 1374.782917] __x64_sys_mkdir+0x5c/0x80 [ 1374.786808] do_syscall_64+0x1b9/0x820 [ 1374.790711] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1374.796079] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1374.801009] ? trace_hardirqs_on_caller+0x310/0x310 [ 1374.806028] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1374.811045] ? recalc_sigpending_tsk+0x180/0x180 [ 1374.815815] ? kasan_check_write+0x14/0x20 [ 1374.820052] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1374.824902] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1374.830085] RIP: 0033:0x4569b7 [ 1374.833281] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1374.852177] RSP: 002b:00007ff838176a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1374.859897] RAX: ffffffffffffffda RBX: 0000000020000150 RCX: 00000000004569b7 00:27:26 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000500)={0x0, 0x2, 0x0, 0x0, 0x7}, 0x0) write$uinput_user_dev(r0, &(0x7f0000000c80)={'syz1\x00'}, 0x45c) fstatfs(0xffffffffffffffff, &(0x7f0000000200)=""/228) ioctl$UI_DEV_CREATE(r0, 0x5501) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000400)=0xc) r2 = dup2(r0, r0) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f0000000000)={0x28}, 0xffd1) signalfd4(r1, &(0x7f0000000040)={0x5}, 0x8, 0x80000) [ 1374.867166] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 1374.874443] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1374.881706] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1374.888975] R13: 0000000000000000 R14: 00000000004d7ef0 R15: 0000000000000003 [ 1374.944632] input: syz1 as /devices/virtual/input/input34 [ 1374.993238] input: syz1 as /devices/virtual/input/input35 [ 1375.031017] IPVS: ftp: loaded support on port[0] = 21 00:27:26 executing program 3 (fault-call:0 fault-nth:24): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{@logbsize={'logbsize', 0x3d, [0x36, 0x38, 0x6b]}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000000)="88f96234488dd25d766070") 00:27:26 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000240)={0x0, 0x0}) bind$bt_rfcomm(r0, &(0x7f00000003c0)={0x1f, {0x101, 0x80000001, 0x5, 0x3f, 0x9, 0x200}, 0x9c3}, 0xa) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, &(0x7f00000002c0)=0xc) kcmp(r1, r2, 0x3, r0, r0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f00000000c0)=0xd1, 0x4) fstatfs(r0, &(0x7f0000000140)=""/218) setxattr$trusted_overlay_opaque(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc1f}, 0x0, 0x0, 0xffffffffffffffff, 0x2) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 1375.172948] FAULT_INJECTION: forcing a failure. [ 1375.172948] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1375.184803] CPU: 1 PID: 4943 Comm: syz-executor3 Not tainted 4.19.0-rc6+ #269 [ 1375.192080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1375.201437] Call Trace: [ 1375.204042] dump_stack+0x1c4/0x2b4 [ 1375.207690] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1375.212892] ? trace_hardirqs_off+0xb8/0x310 [ 1375.217314] should_fail.cold.4+0xa/0x17 [ 1375.221394] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1375.226510] ? kobject_uevent_env+0xf76/0x101e [ 1375.231106] ? wait_for_completion+0x8a0/0x8a0 [ 1375.235706] ? __kasan_slab_free+0x119/0x150 [ 1375.240131] ? mark_held_locks+0x130/0x130 [ 1375.244380] ? kobject_uevent_env+0x100d/0x101e [ 1375.249057] ? kasan_check_write+0x14/0x20 [ 1375.253313] ? mutex_unlock+0xd/0x10 [ 1375.257034] ? lo_ioctl+0xe6/0x1d80 [ 1375.260679] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1375.266233] ? should_fail+0x22d/0xd01 [ 1375.270132] ? blkdev_ioctl+0x15d/0x2010 [ 1375.274218] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1375.279338] ? blkpg_ioctl+0xc10/0xc10 [ 1375.283237] ? lock_downgrade+0x900/0x900 [ 1375.287403] __alloc_pages_nodemask+0x34b/0xde0 [ 1375.292085] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 1375.297107] ? save_stack+0x43/0xd0 [ 1375.300743] ? __kasan_slab_free+0x102/0x150 [ 1375.305163] ? __fget+0x4d1/0x740 [ 1375.308642] ? fs_reclaim_acquire+0x20/0x20 [ 1375.312980] ? lock_downgrade+0x900/0x900 [ 1375.317144] ? ___might_sleep+0x1ed/0x300 [ 1375.321330] ? trace_hardirqs_off+0xb8/0x310 [ 1375.325750] cache_grow_begin+0x91/0x8c0 [ 1375.329830] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1375.335382] kmem_cache_alloc+0x665/0x730 [ 1375.339545] ? fget_raw+0x20/0x20 [ 1375.343016] getname_flags+0xd0/0x5a0 [ 1375.346825] do_mkdirat+0xc5/0x310 [ 1375.350374] ? __ia32_sys_mknod+0xb0/0xb0 [ 1375.354536] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1375.359910] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1375.365372] ? ksys_ioctl+0x81/0xd0 [ 1375.369008] __x64_sys_mkdir+0x5c/0x80 [ 1375.372906] do_syscall_64+0x1b9/0x820 [ 1375.376805] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1375.382176] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1375.387126] ? trace_hardirqs_on_caller+0x310/0x310 [ 1375.392151] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1375.397198] ? recalc_sigpending_tsk+0x180/0x180 [ 1375.401971] ? kasan_check_write+0x14/0x20 [ 1375.406226] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1375.411085] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1375.416276] RIP: 0033:0x4569b7 [ 1375.419481] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1375.438384] RSP: 002b:00007ff838176a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1375.446102] RAX: ffffffffffffffda RBX: 0000000020000150 RCX: 00000000004569b7 [ 1375.453374] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 1375.460649] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1375.467921] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1375.475209] R13: 0000000000000000 R14: 00000000004d7ef0 R15: 0000000000000003 [ 1375.524430] device bridge_slave_1 left promiscuous mode [ 1375.529962] bridge0: port 2(bridge_slave_1) entered disabled state [ 1375.539656] XFS (loop3): invalid logbufsize: 69632 [not 16k,32k,64k,128k or 256k] [ 1375.584611] device bridge_slave_0 left promiscuous mode [ 1375.590102] bridge0: port 1(bridge_slave_0) entered disabled state [ 1375.626630] ================================================================== [ 1375.634036] BUG: KASAN: use-after-free in _free_event+0x49a/0x1610 [ 1375.640367] Write of size 4 at addr ffff880181bf63e0 by task syz-executor5/4952 [ 1375.647803] [ 1375.649440] CPU: 0 PID: 4952 Comm: syz-executor5 Not tainted 4.19.0-rc6+ #269 [ 1375.656717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1375.666069] Call Trace: [ 1375.668666] dump_stack+0x1c4/0x2b4 [ 1375.672305] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1375.677495] ? printk+0xa7/0xcf [ 1375.680779] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 1375.685548] print_address_description.cold.8+0x9/0x1ff [ 1375.690918] kasan_report.cold.9+0x242/0x309 [ 1375.695335] ? _free_event+0x49a/0x1610 [ 1375.699314] check_memory_region+0x13e/0x1b0 [ 1375.703729] kasan_check_write+0x14/0x20 [ 1375.707797] _free_event+0x49a/0x1610 [ 1375.711602] ? kasan_check_read+0x11/0x20 [ 1375.715757] ? ring_buffer_attach+0x840/0x840 [ 1375.720265] ? __perf_remove_from_context+0x1ec/0x470 [ 1375.725471] ? do_raw_spin_lock+0xc1/0x200 [ 1375.729716] ? kasan_check_write+0x14/0x20 [ 1375.733958] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1375.738889] ? event_function_call+0x343/0x600 [ 1375.743484] ? wait_for_completion+0x8a0/0x8a0 [ 1375.748075] ? event_sched_out.isra.98+0xdf0/0xdf0 [ 1375.753019] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1375.758560] ? get_ctx+0x218/0x300 [ 1375.762109] free_event+0xb4/0x180 [ 1375.765656] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1375.771113] ? _free_event+0x1610/0x1610 [ 1375.775197] perf_event_release_kernel+0x7d8/0xfa0 [ 1375.780138] ? put_event+0x60/0x60 [ 1375.783682] ? mark_held_locks+0x130/0x130 [ 1375.787926] ? flock_lock_inode+0x1150/0x1150 [ 1375.792435] ? locks_remove_file+0x3c1/0x5c0 [ 1375.796862] ? kasan_check_read+0x11/0x20 [ 1375.801020] ? do_raw_spin_unlock+0xa7/0x2f0 [ 1375.805442] ? locks_check_ctx_file_list+0xdd/0x120 [ 1375.810473] ? kasan_check_write+0x14/0x20 [ 1375.814720] ? locks_remove_file+0x3c6/0x5c0 [ 1375.819137] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1375.824682] ? ima_file_free+0x132/0x650 [ 1375.828753] ? fsnotify_first_mark+0x350/0x350 [ 1375.833339] ? ima_file_check+0x130/0x130 [ 1375.837491] ? fsnotify+0x12f0/0x12f0 [ 1375.841298] ? prepare_exit_to_usermode+0x342/0x3b0 [ 1375.846322] ? retint_user+0x8/0x18 [ 1375.849963] ? perf_event_release_kernel+0xfa0/0xfa0 [ 1375.855071] perf_release+0x37/0x50 [ 1375.858705] __fput+0x385/0xa30 [ 1375.861993] ? get_max_files+0x20/0x20 [ 1375.865891] ? trace_hardirqs_on+0xbd/0x310 [ 1375.870222] ? kasan_check_read+0x11/0x20 [ 1375.874378] ? task_work_run+0x1af/0x2a0 [ 1375.878442] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1375.883900] ? kasan_check_write+0x14/0x20 [ 1375.888147] ? do_raw_spin_lock+0xc1/0x200 [ 1375.892388] ____fput+0x15/0x20 [ 1375.895678] task_work_run+0x1e8/0x2a0 [ 1375.899575] ? task_work_cancel+0x240/0x240 [ 1375.903906] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1375.909463] ? switch_task_namespaces+0x9d/0xd0 [ 1375.914141] do_exit+0x1ad7/0x2610 [ 1375.917683] ? __put_cred+0x28c/0x360 [ 1375.921496] ? mm_update_next_owner+0x990/0x990 [ 1375.926164] ? prepare_creds+0x4d0/0x4d0 [ 1375.930240] ? kasan_check_write+0x14/0x20 [ 1375.934486] ? do_raw_spin_lock+0xc1/0x200 [ 1375.938727] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1375.944275] ? do_coredump+0x477/0x4001 [ 1375.948259] ? unwind_get_return_address+0x61/0xa0 [ 1375.953204] ? __save_stack_trace+0x8d/0xf0 [ 1375.957542] ? dump_align+0xa0/0xa0 [ 1375.961175] ? save_stack+0xa9/0xd0 [ 1375.964812] ? save_stack+0x43/0xd0 [ 1375.968437] ? __kasan_slab_free+0x102/0x150 [ 1375.972850] ? kasan_slab_free+0xe/0x10 [ 1375.976830] ? kmem_cache_free+0x83/0x290 [ 1375.980988] ? __sigqueue_free.part.27+0x7d/0xa0 [ 1375.985748] ? __dequeue_signal+0x530/0x7d0 [ 1375.990076] ? dequeue_signal+0xbd/0x630 [ 1375.994145] ? get_signal+0x3ec/0x1980 [ 1375.998034] ? do_signal+0x9c/0x21e0 [ 1376.001752] ? exit_to_usermode_loop+0x2e5/0x380 [ 1376.006517] ? prepare_exit_to_usermode+0x342/0x3b0 [ 1376.011539] ? trace_hardirqs_off+0xb8/0x310 [ 1376.016438] ? kasan_check_read+0x11/0x20 [ 1376.020601] ? do_raw_spin_unlock+0xa7/0x2f0 [ 1376.025016] ? trace_hardirqs_on+0x310/0x310 [ 1376.029433] ? kasan_check_write+0x14/0x20 [ 1376.033691] ? check_preemption_disabled+0x48/0x200 [ 1376.038713] ? trace_hardirqs_off+0xb8/0x310 [ 1376.043133] ? __kasan_slab_free+0x119/0x150 [ 1376.047552] ? __sigqueue_free.part.27+0x7d/0xa0 [ 1376.052314] ? kmem_cache_free+0x21a/0x290 [ 1376.056560] ? __sigqueue_free.part.27+0x7d/0xa0 [ 1376.061323] ? __dequeue_signal+0xf9/0x7d0 [ 1376.065566] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1376.071113] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1376.076656] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1376.082291] ? proc_coredump_connector+0x4f8/0x630 [ 1376.087231] ? lock_downgrade+0x900/0x900 [ 1376.091381] ? proc_comm_connector+0x520/0x520 [ 1376.095973] do_group_exit+0x177/0x440 [ 1376.099872] ? __ia32_sys_exit+0x50/0x50 [ 1376.103937] ? kasan_check_write+0x14/0x20 [ 1376.108178] ? do_raw_spin_lock+0xc1/0x200 [ 1376.112434] get_signal+0x8b0/0x1980 [ 1376.116166] ? ptrace_notify+0x130/0x130 [ 1376.120462] ? force_sig_info+0x281/0x310 [ 1376.124624] ? force_sigsegv+0x3d/0x110 [ 1376.128608] ? signal_setup_done+0xc1/0x2f0 [ 1376.132938] ? set_current_blocked+0x40/0x40 [ 1376.137365] do_signal+0x9c/0x21e0 [ 1376.140917] ? setup_sigcontext+0x7d0/0x7d0 [ 1376.145250] ? __bad_area_nosemaphore+0x311/0x3f0 [ 1376.150100] ? bad_area+0x69/0x80 [ 1376.153584] exit_to_usermode_loop+0x2e5/0x380 [ 1376.158172] ? syscall_slow_exit_work+0x520/0x520 [ 1376.163029] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1376.168053] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1376.172906] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1376.177763] prepare_exit_to_usermode+0x342/0x3b0 [ 1376.182612] ? trace_event_raw_event_sys_enter+0x700/0x700 [ 1376.188244] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1376.193099] ? page_fault+0x8/0x30 [ 1376.196644] retint_user+0x8/0x18 [ 1376.200096] RIP: 0033: (null) [ 1376.203978] Code: Bad RIP value. [ 1376.207345] RSP: 002b:0000000020000208 EFLAGS: 00010217 [ 1376.212710] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000457579 [ 1376.219982] RDX: 0000000020000000 RSI: 0000000020000200 RDI: 0000000000000000 [ 1376.227253] RBP: 000000000072bf00 R08: 0000000020000140 R09: 0000000000000000 [ 1376.234526] R10: 0000000020000100 R11: 0000000000000246 R12: 00007ff69ad516d4 [ 1376.241797] R13: 00000000004bd9fa R14: 00000000004cc448 R15: 00000000ffffffff [ 1376.249077] [ 1376.250702] Allocated by task 4949: [ 1376.254332] save_stack+0x43/0xd0 [ 1376.257788] kasan_kmalloc+0xc7/0xe0 [ 1376.261503] kasan_slab_alloc+0x12/0x20 [ 1376.265520] kmem_cache_alloc_node+0x144/0x730 [ 1376.270121] copy_process+0x1ff4/0x8780 [ 1376.274100] _do_fork+0x1cb/0x11d0 [ 1376.277647] __x64_sys_clone+0xbf/0x150 [ 1376.281621] do_syscall_64+0x1b9/0x820 [ 1376.285515] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1376.290693] [ 1376.292316] Freed by task 4949: [ 1376.295594] save_stack+0x43/0xd0 [ 1376.299046] __kasan_slab_free+0x102/0x150 [ 1376.303287] kasan_slab_free+0xe/0x10 [ 1376.307094] kmem_cache_free+0x83/0x290 [ 1376.311067] free_task+0x16e/0x1f0 [ 1376.314606] copy_process+0x1d9a/0x8780 [ 1376.318577] _do_fork+0x1cb/0x11d0 [ 1376.322117] __x64_sys_clone+0xbf/0x150 [ 1376.326094] do_syscall_64+0x1b9/0x820 [ 1376.329983] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1376.335168] [ 1376.336811] The buggy address belongs to the object at ffff880181bf63c0 [ 1376.336811] which belongs to the cache task_struct(97:syz5) of size 6080 [ 1376.350341] The buggy address is located 32 bytes inside of [ 1376.350341] 6080-byte region [ffff880181bf63c0, ffff880181bf7b80) [ 1376.362213] The buggy address belongs to the page: [ 1376.367143] page:ffffea000606fd80 count:1 mapcount:0 mapping:ffff8801d3a46e00 index:0x0 compound_mapcount: 0 [ 1376.377129] flags: 0x2fffc0000008100(slab|head) [ 1376.381806] raw: 02fffc0000008100 ffffea00061dc208 ffff8801d24f5848 ffff8801d3a46e00 [ 1376.389695] raw: 0000000000000000 ffff880181bf63c0 0000000100000001 ffff880185b5a300 [ 1376.397568] page dumped because: kasan: bad access detected [ 1376.403276] page->mem_cgroup:ffff880185b5a300 [ 1376.407763] [ 1376.409385] Memory state around the buggy address: [ 1376.414316] ffff880181bf6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1376.421677] ffff880181bf6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1376.429038] >ffff880181bf6380: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 1376.436390] ^ [ 1376.442879] ffff880181bf6400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1376.450247] ffff880181bf6480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1376.457601] ================================================================== [ 1376.466317] Kernel panic - not syncing: panic_on_warn set ... [ 1376.466317] [ 1376.473715] CPU: 0 PID: 4952 Comm: syz-executor5 Tainted: G B 4.19.0-rc6+ #269 [ 1376.482380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1376.491734] Call Trace: [ 1376.494338] dump_stack+0x1c4/0x2b4 [ 1376.497978] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1376.503181] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1376.507963] panic+0x238/0x4e7 [ 1376.511166] ? add_taint.cold.5+0x16/0x16 [ 1376.515334] ? preempt_schedule+0x4d/0x60 [ 1376.519490] ? ___preempt_schedule+0x16/0x18 [ 1376.523903] ? trace_hardirqs_on+0xb4/0x310 [ 1376.528238] kasan_end_report+0x47/0x4f [ 1376.532228] kasan_report.cold.9+0x76/0x309 [ 1376.536558] ? _free_event+0x49a/0x1610 [ 1376.540537] check_memory_region+0x13e/0x1b0 [ 1376.544961] kasan_check_write+0x14/0x20 [ 1376.549025] _free_event+0x49a/0x1610 [ 1376.552838] ? kasan_check_read+0x11/0x20 [ 1376.556993] ? ring_buffer_attach+0x840/0x840 [ 1376.561495] ? __perf_remove_from_context+0x1ec/0x470 [ 1376.566697] ? do_raw_spin_lock+0xc1/0x200 [ 1376.570944] ? kasan_check_write+0x14/0x20 [ 1376.575200] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1376.580133] ? event_function_call+0x343/0x600 [ 1376.584722] ? wait_for_completion+0x8a0/0x8a0 [ 1376.589315] ? event_sched_out.isra.98+0xdf0/0xdf0 [ 1376.594252] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1376.599790] ? get_ctx+0x218/0x300 [ 1376.603338] free_event+0xb4/0x180 [ 1376.606889] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1376.612344] ? _free_event+0x1610/0x1610 [ 1376.616417] perf_event_release_kernel+0x7d8/0xfa0 [ 1376.621364] ? put_event+0x60/0x60 [ 1376.624917] ? mark_held_locks+0x130/0x130 [ 1376.629157] ? flock_lock_inode+0x1150/0x1150 [ 1376.633671] ? locks_remove_file+0x3c1/0x5c0 [ 1376.638095] ? kasan_check_read+0x11/0x20 [ 1376.642250] ? do_raw_spin_unlock+0xa7/0x2f0 [ 1376.646670] ? locks_check_ctx_file_list+0xdd/0x120 [ 1376.651692] ? kasan_check_write+0x14/0x20 [ 1376.655935] ? locks_remove_file+0x3c6/0x5c0 [ 1376.660359] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1376.665903] ? ima_file_free+0x132/0x650 [ 1376.669974] ? fsnotify_first_mark+0x350/0x350 [ 1376.674560] ? ima_file_check+0x130/0x130 [ 1376.678716] ? fsnotify+0x12f0/0x12f0 [ 1376.682526] ? prepare_exit_to_usermode+0x342/0x3b0 [ 1376.687545] ? retint_user+0x8/0x18 [ 1376.691194] ? perf_event_release_kernel+0xfa0/0xfa0 [ 1376.696316] perf_release+0x37/0x50 [ 1376.699947] __fput+0x385/0xa30 [ 1376.703239] ? get_max_files+0x20/0x20 [ 1376.707137] ? trace_hardirqs_on+0xbd/0x310 [ 1376.711466] ? kasan_check_read+0x11/0x20 [ 1376.715623] ? task_work_run+0x1af/0x2a0 [ 1376.719691] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1376.725143] ? kasan_check_write+0x14/0x20 [ 1376.729384] ? do_raw_spin_lock+0xc1/0x200 [ 1376.733623] ____fput+0x15/0x20 [ 1376.736907] task_work_run+0x1e8/0x2a0 [ 1376.740807] ? task_work_cancel+0x240/0x240 [ 1376.745138] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1376.750685] ? switch_task_namespaces+0x9d/0xd0 [ 1376.755367] do_exit+0x1ad7/0x2610 [ 1376.758912] ? __put_cred+0x28c/0x360 [ 1376.762721] ? mm_update_next_owner+0x990/0x990 [ 1376.767392] ? prepare_creds+0x4d0/0x4d0 [ 1376.771468] ? kasan_check_write+0x14/0x20 [ 1376.775711] ? do_raw_spin_lock+0xc1/0x200 [ 1376.779951] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1376.785498] ? do_coredump+0x477/0x4001 [ 1376.789484] ? unwind_get_return_address+0x61/0xa0 [ 1376.794420] ? __save_stack_trace+0x8d/0xf0 [ 1376.798769] ? dump_align+0xa0/0xa0 [ 1376.802400] ? save_stack+0xa9/0xd0 [ 1376.806028] ? save_stack+0x43/0xd0 [ 1376.809655] ? __kasan_slab_free+0x102/0x150 [ 1376.814081] ? kasan_slab_free+0xe/0x10 [ 1376.818060] ? kmem_cache_free+0x83/0x290 [ 1376.822221] ? __sigqueue_free.part.27+0x7d/0xa0 [ 1376.826980] ? __dequeue_signal+0x530/0x7d0 [ 1376.831308] ? dequeue_signal+0xbd/0x630 [ 1376.835376] ? get_signal+0x3ec/0x1980 [ 1376.839268] ? do_signal+0x9c/0x21e0 [ 1376.842989] ? exit_to_usermode_loop+0x2e5/0x380 [ 1376.847750] ? prepare_exit_to_usermode+0x342/0x3b0 [ 1376.852775] ? trace_hardirqs_off+0xb8/0x310 [ 1376.857195] ? kasan_check_read+0x11/0x20 [ 1376.861356] ? do_raw_spin_unlock+0xa7/0x2f0 [ 1376.865769] ? trace_hardirqs_on+0x310/0x310 [ 1376.870182] ? kasan_check_write+0x14/0x20 [ 1376.874445] ? check_preemption_disabled+0x48/0x200 [ 1376.879483] ? trace_hardirqs_off+0xb8/0x310 [ 1376.883904] ? __kasan_slab_free+0x119/0x150 [ 1376.888322] ? __sigqueue_free.part.27+0x7d/0xa0 [ 1376.893087] ? kmem_cache_free+0x21a/0x290 [ 1376.897329] ? __sigqueue_free.part.27+0x7d/0xa0 [ 1376.902097] ? __dequeue_signal+0xf9/0x7d0 [ 1376.906341] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1376.911892] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1376.917434] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1376.922982] ? proc_coredump_connector+0x4f8/0x630 [ 1376.927918] ? lock_downgrade+0x900/0x900 [ 1376.932067] ? proc_comm_connector+0x520/0x520 [ 1376.936664] do_group_exit+0x177/0x440 [ 1376.940566] ? __ia32_sys_exit+0x50/0x50 [ 1376.944631] ? kasan_check_write+0x14/0x20 [ 1376.948872] ? do_raw_spin_lock+0xc1/0x200 [ 1376.953120] get_signal+0x8b0/0x1980 [ 1376.956845] ? ptrace_notify+0x130/0x130 [ 1376.960909] ? force_sig_info+0x281/0x310 [ 1376.965068] ? force_sigsegv+0x3d/0x110 [ 1376.969050] ? signal_setup_done+0xc1/0x2f0 [ 1376.973377] ? set_current_blocked+0x40/0x40 [ 1376.977797] do_signal+0x9c/0x21e0 [ 1376.981347] ? setup_sigcontext+0x7d0/0x7d0 [ 1376.985674] ? __bad_area_nosemaphore+0x311/0x3f0 [ 1376.990530] ? bad_area+0x69/0x80 [ 1376.994016] exit_to_usermode_loop+0x2e5/0x380 [ 1376.998609] ? syscall_slow_exit_work+0x520/0x520 [ 1377.003464] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1377.008489] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1377.013340] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1377.018202] prepare_exit_to_usermode+0x342/0x3b0 [ 1377.023058] ? trace_event_raw_event_sys_enter+0x700/0x700 [ 1377.028688] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1377.033538] ? page_fault+0x8/0x30 [ 1377.037086] retint_user+0x8/0x18 [ 1377.040536] RIP: 0033: (null) [ 1377.044419] Code: Bad RIP value. [ 1377.047792] RSP: 002b:0000000020000208 EFLAGS: 00010217 [ 1377.053161] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000457579 [ 1377.060441] RDX: 0000000020000000 RSI: 0000000020000200 RDI: 0000000000000000 [ 1377.067718] RBP: 000000000072bf00 R08: 0000000020000140 R09: 0000000000000000 [ 1377.074987] R10: 0000000020000100 R11: 0000000000000246 R12: 00007ff69ad516d4 [ 1377.082256] R13: 00000000004bd9fa R14: 00000000004cc448 R15: 00000000ffffffff [ 1377.090551] Kernel Offset: disabled [ 1377.094174] Rebooting in 86400 seconds..