Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.196' (ECDSA) to the list of known hosts. 2021/03/06 10:51:31 fuzzer started 2021/03/06 10:51:31 dialing manager at 10.128.0.169:45029 2021/03/06 10:51:38 syscalls: 1690 2021/03/06 10:51:38 code coverage: enabled 2021/03/06 10:51:38 comparison tracing: enabled 2021/03/06 10:51:38 extra coverage: enabled 2021/03/06 10:51:38 setuid sandbox: enabled 2021/03/06 10:51:38 namespace sandbox: enabled 2021/03/06 10:51:38 Android sandbox: /sys/fs/selinux/policy does not exist 2021/03/06 10:51:38 fault injection: enabled 2021/03/06 10:51:38 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/03/06 10:51:38 net packet injection: enabled 2021/03/06 10:51:38 net device setup: enabled 2021/03/06 10:51:38 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/03/06 10:51:38 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/03/06 10:51:38 USB emulation: enabled 2021/03/06 10:51:38 hci packet injection: enabled 2021/03/06 10:51:38 wifi device emulation: enabled 2021/03/06 10:51:38 802.15.4 emulation: enabled 2021/03/06 10:51:38 fetching corpus: 0, signal 0/2000 (executing program) 2021/03/06 10:51:38 fetching corpus: 50, signal 43497/46830 (executing program) 2021/03/06 10:51:38 fetching corpus: 100, signal 55154/59880 (executing program) 2021/03/06 10:51:38 fetching corpus: 147, signal 63636/69651 (executing program) 2021/03/06 10:51:39 fetching corpus: 197, signal 69560/76844 (executing program) 2021/03/06 10:51:39 fetching corpus: 247, signal 77696/86038 (executing program) 2021/03/06 10:51:39 fetching corpus: 297, signal 84357/93712 (executing program) 2021/03/06 10:51:39 fetching corpus: 347, signal 89419/99789 (executing program) 2021/03/06 10:51:39 fetching corpus: 396, signal 96016/107212 (executing program) 2021/03/06 10:51:40 fetching corpus: 446, signal 100640/112741 (executing program) 2021/03/06 10:51:40 fetching corpus: 495, signal 103137/116268 (executing program) 2021/03/06 10:51:40 fetching corpus: 545, signal 106755/120770 (executing program) 2021/03/06 10:51:41 fetching corpus: 594, signal 109859/124737 (executing program) 2021/03/06 10:51:41 fetching corpus: 644, signal 114363/129946 (executing program) 2021/03/06 10:51:41 fetching corpus: 690, signal 117090/133495 (executing program) 2021/03/06 10:51:41 fetching corpus: 740, signal 119908/137045 (executing program) 2021/03/06 10:51:42 fetching corpus: 790, signal 122288/140210 (executing program) 2021/03/06 10:51:42 fetching corpus: 840, signal 124793/143420 (executing program) 2021/03/06 10:51:42 fetching corpus: 889, signal 126685/146062 (executing program) 2021/03/06 10:51:42 fetching corpus: 939, signal 128731/148834 (executing program) 2021/03/06 10:51:43 fetching corpus: 989, signal 130645/151449 (executing program) 2021/03/06 10:51:43 fetching corpus: 1039, signal 132750/154189 (executing program) 2021/03/06 10:51:43 fetching corpus: 1089, signal 135082/157081 (executing program) 2021/03/06 10:51:43 fetching corpus: 1136, signal 138158/160504 (executing program) 2021/03/06 10:51:44 fetching corpus: 1186, signal 140570/163389 (executing program) 2021/03/06 10:51:44 fetching corpus: 1233, signal 142841/166129 (executing program) 2021/03/06 10:51:44 fetching corpus: 1283, signal 144784/168568 (executing program) 2021/03/06 10:51:45 fetching corpus: 1333, signal 146473/170772 (executing program) 2021/03/06 10:51:45 fetching corpus: 1383, signal 148033/172825 (executing program) 2021/03/06 10:51:45 fetching corpus: 1431, signal 150369/175524 (executing program) 2021/03/06 10:51:45 fetching corpus: 1480, signal 151674/177318 (executing program) 2021/03/06 10:51:45 fetching corpus: 1528, signal 153279/179360 (executing program) 2021/03/06 10:51:46 fetching corpus: 1578, signal 154918/181401 (executing program) 2021/03/06 10:51:46 fetching corpus: 1627, signal 156379/183225 (executing program) 2021/03/06 10:51:46 fetching corpus: 1675, signal 158031/185268 (executing program) 2021/03/06 10:51:46 fetching corpus: 1725, signal 159708/187246 (executing program) 2021/03/06 10:51:47 fetching corpus: 1772, signal 161196/189045 (executing program) 2021/03/06 10:51:47 fetching corpus: 1821, signal 162601/190788 (executing program) 2021/03/06 10:51:48 fetching corpus: 1871, signal 163662/192306 (executing program) 2021/03/06 10:51:48 fetching corpus: 1920, signal 164808/193813 (executing program) 2021/03/06 10:51:48 fetching corpus: 1969, signal 165740/195211 (executing program) 2021/03/06 10:51:48 fetching corpus: 2019, signal 167216/196936 (executing program) 2021/03/06 10:51:49 fetching corpus: 2069, signal 168450/198476 (executing program) 2021/03/06 10:51:49 fetching corpus: 2117, signal 169797/200080 (executing program) 2021/03/06 10:51:49 fetching corpus: 2165, signal 170939/201501 (executing program) 2021/03/06 10:51:50 fetching corpus: 2214, signal 172287/203045 (executing program) 2021/03/06 10:51:50 fetching corpus: 2263, signal 173271/204351 (executing program) 2021/03/06 10:51:50 fetching corpus: 2312, signal 174935/206002 (executing program) 2021/03/06 10:51:50 fetching corpus: 2362, signal 175808/207201 (executing program) 2021/03/06 10:51:50 fetching corpus: 2412, signal 176925/208549 (executing program) 2021/03/06 10:51:51 fetching corpus: 2462, signal 177984/209739 (executing program) 2021/03/06 10:51:51 fetching corpus: 2511, signal 178781/210860 (executing program) 2021/03/06 10:51:51 fetching corpus: 2560, signal 179854/212090 (executing program) 2021/03/06 10:51:51 fetching corpus: 2609, signal 180706/213155 (executing program) 2021/03/06 10:51:52 fetching corpus: 2658, signal 181924/214466 (executing program) 2021/03/06 10:51:52 fetching corpus: 2708, signal 182864/215623 (executing program) 2021/03/06 10:51:52 fetching corpus: 2757, signal 183612/216646 (executing program) 2021/03/06 10:51:53 fetching corpus: 2807, signal 184730/217831 (executing program) 2021/03/06 10:51:53 fetching corpus: 2857, signal 186040/219077 (executing program) 2021/03/06 10:51:53 fetching corpus: 2907, signal 186806/220008 (executing program) 2021/03/06 10:51:53 fetching corpus: 2957, signal 187542/220922 (executing program) 2021/03/06 10:51:53 fetching corpus: 3007, signal 188392/221924 (executing program) 2021/03/06 10:51:54 fetching corpus: 3057, signal 189501/223055 (executing program) 2021/03/06 10:51:54 fetching corpus: 3107, signal 190494/224094 (executing program) 2021/03/06 10:51:54 fetching corpus: 3155, signal 191160/224974 (executing program) 2021/03/06 10:51:55 fetching corpus: 3205, signal 192041/225935 (executing program) 2021/03/06 10:51:55 fetching corpus: 3255, signal 193004/226915 (executing program) 2021/03/06 10:51:55 fetching corpus: 3305, signal 193897/227918 (executing program) 2021/03/06 10:51:55 fetching corpus: 3353, signal 195015/228945 (executing program) 2021/03/06 10:51:56 fetching corpus: 3402, signal 195882/229815 (executing program) 2021/03/06 10:51:56 fetching corpus: 3451, signal 196633/230684 (executing program) 2021/03/06 10:51:56 fetching corpus: 3501, signal 197410/231518 (executing program) 2021/03/06 10:51:57 fetching corpus: 3551, signal 199009/232620 (executing program) 2021/03/06 10:51:57 fetching corpus: 3601, signal 199756/233436 (executing program) 2021/03/06 10:51:57 fetching corpus: 3649, signal 200890/234428 (executing program) 2021/03/06 10:51:58 fetching corpus: 3698, signal 201971/235302 (executing program) 2021/03/06 10:51:58 fetching corpus: 3745, signal 202727/236036 (executing program) 2021/03/06 10:51:58 fetching corpus: 3794, signal 203403/236734 (executing program) 2021/03/06 10:51:58 fetching corpus: 3843, signal 204086/237449 (executing program) 2021/03/06 10:51:59 fetching corpus: 3893, signal 204793/238150 (executing program) 2021/03/06 10:51:59 fetching corpus: 3942, signal 205445/238846 (executing program) 2021/03/06 10:51:59 fetching corpus: 3990, signal 206552/239679 (executing program) 2021/03/06 10:52:00 fetching corpus: 4040, signal 207482/240411 (executing program) 2021/03/06 10:52:00 fetching corpus: 4090, signal 208114/241009 (executing program) 2021/03/06 10:52:00 fetching corpus: 4138, signal 208716/241563 (executing program) 2021/03/06 10:52:01 fetching corpus: 4187, signal 209383/242191 (executing program) 2021/03/06 10:52:01 fetching corpus: 4237, signal 210029/242817 (executing program) 2021/03/06 10:52:01 fetching corpus: 4284, signal 210488/243310 (executing program) 2021/03/06 10:52:01 fetching corpus: 4334, signal 211253/243895 (executing program) 2021/03/06 10:52:02 fetching corpus: 4384, signal 211934/244459 (executing program) 2021/03/06 10:52:02 fetching corpus: 4434, signal 212403/244983 (executing program) 2021/03/06 10:52:02 fetching corpus: 4484, signal 213094/245521 (executing program) 2021/03/06 10:52:02 fetching corpus: 4534, signal 213654/246065 (executing program) 2021/03/06 10:52:03 fetching corpus: 4584, signal 214382/246636 (executing program) 2021/03/06 10:52:03 fetching corpus: 4633, signal 214877/247147 (executing program) 2021/03/06 10:52:03 fetching corpus: 4682, signal 215455/247601 (executing program) 2021/03/06 10:52:03 fetching corpus: 4731, signal 216385/248158 (executing program) 2021/03/06 10:52:04 fetching corpus: 4779, signal 216905/248606 (executing program) 2021/03/06 10:52:04 fetching corpus: 4828, signal 217407/249016 (executing program) 2021/03/06 10:52:04 fetching corpus: 4878, signal 218188/249530 (executing program) 2021/03/06 10:52:04 fetching corpus: 4928, signal 218868/250007 (executing program) 2021/03/06 10:52:05 fetching corpus: 4978, signal 219383/250454 (executing program) 2021/03/06 10:52:05 fetching corpus: 5028, signal 220134/250934 (executing program) 2021/03/06 10:52:05 fetching corpus: 5078, signal 220625/251383 (executing program) 2021/03/06 10:52:05 fetching corpus: 5127, signal 221454/251831 (executing program) 2021/03/06 10:52:06 fetching corpus: 5177, signal 221954/252207 (executing program) 2021/03/06 10:52:06 fetching corpus: 5227, signal 222465/252585 (executing program) 2021/03/06 10:52:06 fetching corpus: 5277, signal 223193/252973 (executing program) 2021/03/06 10:52:06 fetching corpus: 5327, signal 223693/253337 (executing program) 2021/03/06 10:52:06 fetching corpus: 5375, signal 224360/253706 (executing program) 2021/03/06 10:52:07 fetching corpus: 5425, signal 224829/254028 (executing program) 2021/03/06 10:52:07 fetching corpus: 5475, signal 225226/254363 (executing program) 2021/03/06 10:52:07 fetching corpus: 5524, signal 225820/254731 (executing program) 2021/03/06 10:52:07 fetching corpus: 5571, signal 227321/255153 (executing program) 2021/03/06 10:52:08 fetching corpus: 5621, signal 227982/255486 (executing program) 2021/03/06 10:52:08 fetching corpus: 5671, signal 228642/255805 (executing program) 2021/03/06 10:52:08 fetching corpus: 5721, signal 229078/256107 (executing program) 2021/03/06 10:52:08 fetching corpus: 5770, signal 229585/256387 (executing program) 2021/03/06 10:52:08 fetching corpus: 5820, signal 230073/256669 (executing program) 2021/03/06 10:52:09 fetching corpus: 5868, signal 230649/256918 (executing program) 2021/03/06 10:52:09 fetching corpus: 5916, signal 231234/257191 (executing program) 2021/03/06 10:52:09 fetching corpus: 5965, signal 231736/257509 (executing program) 2021/03/06 10:52:09 fetching corpus: 6013, signal 232139/257734 (executing program) 2021/03/06 10:52:10 fetching corpus: 6060, signal 232573/258030 (executing program) 2021/03/06 10:52:10 fetching corpus: 6110, signal 233254/258283 (executing program) 2021/03/06 10:52:10 fetching corpus: 6159, signal 233883/258511 (executing program) 2021/03/06 10:52:10 fetching corpus: 6208, signal 234296/258706 (executing program) 2021/03/06 10:52:11 fetching corpus: 6257, signal 235190/258915 (executing program) 2021/03/06 10:52:11 fetching corpus: 6307, signal 235829/259087 (executing program) 2021/03/06 10:52:11 fetching corpus: 6356, signal 236341/259195 (executing program) 2021/03/06 10:52:12 fetching corpus: 6405, signal 236927/259236 (executing program) 2021/03/06 10:52:12 fetching corpus: 6455, signal 237370/259236 (executing program) 2021/03/06 10:52:12 fetching corpus: 6505, signal 237941/259253 (executing program) 2021/03/06 10:52:12 fetching corpus: 6555, signal 238444/259253 (executing program) 2021/03/06 10:52:12 fetching corpus: 6604, signal 239044/259310 (executing program) 2021/03/06 10:52:13 fetching corpus: 6654, signal 239658/259310 (executing program) 2021/03/06 10:52:13 fetching corpus: 6703, signal 240280/259310 (executing program) 2021/03/06 10:52:13 fetching corpus: 6753, signal 240599/259310 (executing program) 2021/03/06 10:52:13 fetching corpus: 6803, signal 241029/259311 (executing program) 2021/03/06 10:52:14 fetching corpus: 6851, signal 241468/259317 (executing program) 2021/03/06 10:52:14 fetching corpus: 6901, signal 242477/259317 (executing program) 2021/03/06 10:52:14 fetching corpus: 6950, signal 243053/259326 (executing program) 2021/03/06 10:52:14 fetching corpus: 7000, signal 243584/259330 (executing program) 2021/03/06 10:52:15 fetching corpus: 7049, signal 244090/259332 (executing program) 2021/03/06 10:52:15 fetching corpus: 7098, signal 244448/259332 (executing program) 2021/03/06 10:52:15 fetching corpus: 7148, signal 244848/259347 (executing program) 2021/03/06 10:52:15 fetching corpus: 7198, signal 245488/259347 (executing program) 2021/03/06 10:52:15 fetching corpus: 7247, signal 245945/259368 (executing program) 2021/03/06 10:52:16 fetching corpus: 7295, signal 246311/259376 (executing program) 2021/03/06 10:52:16 fetching corpus: 7344, signal 246798/259376 (executing program) 2021/03/06 10:52:16 fetching corpus: 7394, signal 247220/259376 (executing program) 2021/03/06 10:52:16 fetching corpus: 7443, signal 248037/259376 (executing program) 2021/03/06 10:52:17 fetching corpus: 7493, signal 248508/259376 (executing program) 2021/03/06 10:52:17 fetching corpus: 7541, signal 248853/259378 (executing program) 2021/03/06 10:52:17 fetching corpus: 7589, signal 249275/259378 (executing program) 2021/03/06 10:52:17 fetching corpus: 7637, signal 249520/259392 (executing program) 2021/03/06 10:52:18 fetching corpus: 7685, signal 250100/259422 (executing program) 2021/03/06 10:52:18 fetching corpus: 7734, signal 250578/259423 (executing program) 2021/03/06 10:52:18 fetching corpus: 7783, signal 251017/259471 (executing program) 2021/03/06 10:52:18 fetching corpus: 7833, signal 251385/259471 (executing program) 2021/03/06 10:52:18 fetching corpus: 7881, signal 252028/259492 (executing program) 2021/03/06 10:52:18 fetching corpus: 7930, signal 252496/259492 (executing program) 2021/03/06 10:52:19 fetching corpus: 7978, signal 253037/259505 (executing program) 2021/03/06 10:52:19 fetching corpus: 8028, signal 253350/259505 (executing program) 2021/03/06 10:52:19 fetching corpus: 8077, signal 253631/259521 (executing program) 2021/03/06 10:52:19 fetching corpus: 8127, signal 254104/259521 (executing program) 2021/03/06 10:52:20 fetching corpus: 8176, signal 254469/259559 (executing program) 2021/03/06 10:52:20 fetching corpus: 8225, signal 254864/259559 (executing program) 2021/03/06 10:52:20 fetching corpus: 8275, signal 255176/259563 (executing program) 2021/03/06 10:52:20 fetching corpus: 8325, signal 255491/259603 (executing program) 2021/03/06 10:52:21 fetching corpus: 8374, signal 255917/259699 (executing program) 2021/03/06 10:52:21 fetching corpus: 8423, signal 256285/259699 (executing program) 2021/03/06 10:52:21 fetching corpus: 8473, signal 256645/259699 (executing program) 2021/03/06 10:52:21 fetching corpus: 8522, signal 257011/259705 (executing program) 2021/03/06 10:52:22 fetching corpus: 8571, signal 257481/259722 (executing program) 2021/03/06 10:52:22 fetching corpus: 8621, signal 257838/259722 (executing program) 2021/03/06 10:52:22 fetching corpus: 8670, signal 258294/259722 (executing program) 2021/03/06 10:52:22 fetching corpus: 8675, signal 258345/259759 (executing program) 2021/03/06 10:52:22 fetching corpus: 8675, signal 258345/259759 (executing program) 2021/03/06 10:52:23 starting 6 fuzzer processes 10:52:23 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000002440)) unshare(0x40000000) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f00000003c0)=0x871, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @local}, 0x10) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000080)={0x7, 'macvtap0\x00', {0x20}}) sendto$inet(r0, 0x0, 0x0, 0x20024ffc, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x8) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000002e0001002cbd70000000000017000000dfbfe0b108adf78b9e52386812392d3aa8cb8cc32fbef8f0e8657fd41565339b845046469d7c816b76"], 0x14}}, 0x20040800) bind(r1, 0x0, 0x0) unshare(0xc030700) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000180), 0x4) unshare(0x40040400) unshare(0x4020000) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x6d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) recvmsg(r0, &(0x7f0000001500)={0x0, 0x2, &(0x7f0000002200)=[{&(0x7f00000035c0)=""/4106, 0x200045ca}], 0x1, 0x0, 0xb2c86da597010000}, 0x100) 10:52:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_newnexthop={0x24, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_ENCAP_TYPE={0x6}, @NHA_FDB={0x4}]}, 0x24}}, 0x0) 10:52:24 executing program 2: ioctl$BTRFS_IOC_SET_FEATURES(0xffffffffffffffff, 0x40309439, &(0x7f0000000040)={0x0, 0x0, 0x5}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 10:52:24 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) ioctl$FIBMAP(r1, 0x1, &(0x7f00000000c0)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r1, 0x0, 0x8}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x34) sendmmsg(r3, &(0x7f0000007fc0), 0x400000000000017, 0x0) 10:52:24 executing program 4: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0xd, 0x0, 0x0) unshare(0x40000000) 10:52:25 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xa, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x38) syzkaller login: [ 124.231038][ T8443] IPVS: ftp: loaded support on port[0] = 21 [ 124.400822][ T8445] IPVS: ftp: loaded support on port[0] = 21 [ 124.681155][ T8447] IPVS: ftp: loaded support on port[0] = 21 [ 124.688257][ T8443] chnl_net:caif_netlink_parms(): no params data found [ 124.819065][ T8445] chnl_net:caif_netlink_parms(): no params data found [ 125.003368][ T8443] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.005843][ T8449] IPVS: ftp: loaded support on port[0] = 21 [ 125.010486][ T8443] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.028100][ T8443] device bridge_slave_0 entered promiscuous mode [ 125.039914][ T8443] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.048051][ T8443] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.057994][ T8443] device bridge_slave_1 entered promiscuous mode [ 125.088992][ T8445] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.096130][ T8445] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.104522][ T8445] device bridge_slave_0 entered promiscuous mode [ 125.129831][ T8445] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.147811][ T8445] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.185223][ T8445] device bridge_slave_1 entered promiscuous mode [ 125.206206][ T8443] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 125.265410][ T8443] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 125.292294][ T8445] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 125.305933][ T8445] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 125.328227][ T8451] IPVS: ftp: loaded support on port[0] = 21 [ 125.405032][ T8445] team0: Port device team_slave_0 added [ 125.429337][ T8445] team0: Port device team_slave_1 added [ 125.440629][ T8443] team0: Port device team_slave_0 added [ 125.450110][ T8447] chnl_net:caif_netlink_parms(): no params data found [ 125.473088][ T8443] team0: Port device team_slave_1 added [ 125.521082][ T8443] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 125.529520][ T8443] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 125.556609][ T8443] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 125.581253][ T8445] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 125.588412][ T8445] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 125.615690][ T8445] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 125.681759][ T8443] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 125.695617][ T8443] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 125.724230][ T8443] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 125.752248][ T8445] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 125.775632][ T8445] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 125.806775][ T8445] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 125.871988][ T8549] IPVS: ftp: loaded support on port[0] = 21 [ 125.902384][ T8445] device hsr_slave_0 entered promiscuous mode [ 125.909309][ T8445] device hsr_slave_1 entered promiscuous mode [ 125.955553][ T8443] device hsr_slave_0 entered promiscuous mode [ 125.963566][ T8443] device hsr_slave_1 entered promiscuous mode [ 125.970248][ T8443] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 125.979077][ T8443] Cannot create hsr debugfs directory [ 125.996971][ T8449] chnl_net:caif_netlink_parms(): no params data found [ 126.099797][ T8447] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.108478][ T8447] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.117234][ T8447] device bridge_slave_0 entered promiscuous mode [ 126.182049][ T8447] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.190048][ T7] Bluetooth: hci0: command 0x0409 tx timeout [ 126.204578][ T8447] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.212290][ T8447] device bridge_slave_1 entered promiscuous mode [ 126.287274][ T8447] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 126.319236][ T8447] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 126.371555][ T8447] team0: Port device team_slave_0 added [ 126.387783][ T8451] chnl_net:caif_netlink_parms(): no params data found [ 126.416217][ T8447] team0: Port device team_slave_1 added [ 126.423353][ T3430] Bluetooth: hci1: command 0x0409 tx timeout [ 126.480561][ T8447] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 126.488241][ T8447] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 126.514431][ T8447] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 126.532137][ T8447] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 126.539227][ T8447] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 126.565950][ T8447] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 126.649703][ T8449] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.658152][ T8449] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.665649][ T19] Bluetooth: hci2: command 0x0409 tx timeout [ 126.674210][ T8449] device bridge_slave_0 entered promiscuous mode [ 126.685711][ T8449] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.692827][ T8449] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.700743][ T8449] device bridge_slave_1 entered promiscuous mode [ 126.759197][ T8447] device hsr_slave_0 entered promiscuous mode [ 126.766591][ T8447] device hsr_slave_1 entered promiscuous mode [ 126.775194][ T8447] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 126.783855][ T8447] Cannot create hsr debugfs directory [ 126.798973][ T8449] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 126.826644][ T8549] chnl_net:caif_netlink_parms(): no params data found [ 126.840608][ T8449] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 126.903028][ T19] Bluetooth: hci3: command 0x0409 tx timeout [ 126.911990][ T8449] team0: Port device team_slave_0 added [ 126.957025][ T8449] team0: Port device team_slave_1 added [ 126.963169][ T8451] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.970348][ T8451] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.978923][ T8451] device bridge_slave_0 entered promiscuous mode [ 127.010135][ T8451] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.017396][ T8451] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.027352][ T8451] device bridge_slave_1 entered promiscuous mode [ 127.083225][ T8449] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 127.090206][ T8449] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 127.122334][ T8449] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 127.136725][ T8449] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 127.144988][ T8449] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 127.145900][ T3430] Bluetooth: hci4: command 0x0409 tx timeout [ 127.178481][ T8449] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 127.217462][ T8443] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 127.229806][ T8443] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 127.262566][ T8451] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 127.279848][ T8443] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 127.316592][ T8451] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 127.360311][ T8443] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 127.409679][ T8449] device hsr_slave_0 entered promiscuous mode [ 127.416938][ T8449] device hsr_slave_1 entered promiscuous mode [ 127.424325][ T8449] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 127.431909][ T8449] Cannot create hsr debugfs directory [ 127.464687][ T8451] team0: Port device team_slave_0 added [ 127.477785][ T8445] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 127.490056][ T8445] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 127.507598][ T8549] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.515371][ T8549] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.524238][ T8549] device bridge_slave_0 entered promiscuous mode [ 127.533130][ T8451] team0: Port device team_slave_1 added [ 127.539024][ T8549] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.546827][ T8549] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.555525][ T8549] device bridge_slave_1 entered promiscuous mode [ 127.580649][ T8445] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 127.644632][ T8445] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 127.681837][ T8549] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 127.692565][ T8451] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 127.700927][ T8451] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 127.728319][ T8451] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 127.733004][ T3165] Bluetooth: hci5: command 0x0409 tx timeout [ 127.752158][ T8451] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 127.759961][ T8451] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 127.786708][ T8451] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 127.815090][ T8549] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 127.850876][ T8447] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 127.896793][ T8447] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 127.911032][ T8549] team0: Port device team_slave_0 added [ 127.938649][ T8549] team0: Port device team_slave_1 added [ 127.956572][ T8447] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 127.967886][ T8447] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 127.986932][ T8451] device hsr_slave_0 entered promiscuous mode [ 127.995117][ T8451] device hsr_slave_1 entered promiscuous mode [ 128.001686][ T8451] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 128.009448][ T8451] Cannot create hsr debugfs directory [ 128.054746][ T8549] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 128.061716][ T8549] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 128.088471][ T8549] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 128.132323][ T8549] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 128.148015][ T8549] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 128.174623][ T8549] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 128.266875][ T7] Bluetooth: hci0: command 0x041b tx timeout [ 128.267325][ T8549] device hsr_slave_0 entered promiscuous mode [ 128.281523][ T8549] device hsr_slave_1 entered promiscuous mode [ 128.288845][ T8549] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 128.296912][ T8549] Cannot create hsr debugfs directory [ 128.361875][ T8443] 8021q: adding VLAN 0 to HW filter on device bond0 [ 128.401220][ T8449] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 128.410899][ T8449] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 128.447486][ T8449] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 128.456966][ T8449] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 128.487635][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 128.497376][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 128.523246][ T7] Bluetooth: hci1: command 0x041b tx timeout [ 128.536174][ T8443] 8021q: adding VLAN 0 to HW filter on device team0 [ 128.610468][ T8445] 8021q: adding VLAN 0 to HW filter on device bond0 [ 128.624523][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 128.635677][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 128.645413][ T3165] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.652727][ T3165] bridge0: port 1(bridge_slave_0) entered forwarding state [ 128.705753][ T9574] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 128.714632][ T9574] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 128.723559][ T9574] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 128.731884][ T9574] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.738992][ T9574] bridge0: port 2(bridge_slave_1) entered forwarding state [ 128.748337][ T9574] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 128.768147][ T8451] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 128.777228][ T9719] Bluetooth: hci2: command 0x041b tx timeout [ 128.791824][ T8451] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 128.833419][ T8447] 8021q: adding VLAN 0 to HW filter on device bond0 [ 128.853735][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 128.866343][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 128.877107][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 128.886741][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 128.896317][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 128.905449][ T8451] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 128.921063][ T8451] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 128.954788][ T8443] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 128.965566][ T8443] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 128.979942][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 128.989868][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 128.999243][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 129.010470][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 129.020231][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 129.029706][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 129.038436][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 129.047272][ T7] Bluetooth: hci3: command 0x041b tx timeout [ 129.083646][ T9730] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 129.096426][ T8445] 8021q: adding VLAN 0 to HW filter on device team0 [ 129.124274][ T8447] 8021q: adding VLAN 0 to HW filter on device team0 [ 129.131361][ T8549] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 129.156049][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 129.167690][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 129.204906][ T8549] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 129.222898][ T9663] Bluetooth: hci4: command 0x041b tx timeout [ 129.223772][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 129.240591][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 129.250066][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.257263][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 129.267073][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 129.276144][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 129.284876][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.291949][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 129.299940][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 129.309893][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 129.318523][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.325686][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 129.335242][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 129.344196][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 129.352980][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.360102][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 129.368989][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 129.377959][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 129.397290][ T8549] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 129.407903][ T8549] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 129.430644][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 129.440796][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 129.449390][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 129.463858][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 129.479601][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 129.499902][ T8443] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 129.544262][ T8449] 8021q: adding VLAN 0 to HW filter on device bond0 [ 129.558063][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 129.567769][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 129.577758][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 129.587102][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 129.597878][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 129.607794][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 129.617028][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 129.657871][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 129.668117][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 129.678888][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 129.689049][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 129.700140][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 129.709943][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 129.718888][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 129.728120][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 129.747754][ T8447] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 129.771371][ T8449] 8021q: adding VLAN 0 to HW filter on device team0 [ 129.779787][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 129.789151][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 129.793192][ T3430] Bluetooth: hci5: command 0x041b tx timeout [ 129.809458][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 129.819362][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 129.828551][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 129.837966][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 129.847147][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 129.855931][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 129.868176][ T8445] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 129.931811][ T8443] device veth0_vlan entered promiscuous mode [ 129.940071][ T3430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 129.951436][ T3430] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 129.961297][ T3430] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.968422][ T3430] bridge0: port 1(bridge_slave_0) entered forwarding state [ 129.977872][ T3430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 129.987817][ T3430] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 129.996700][ T3430] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.003862][ T3430] bridge0: port 2(bridge_slave_1) entered forwarding state [ 130.012237][ T3430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 130.021682][ T3430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 130.030363][ T3430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 130.072430][ T8443] device veth1_vlan entered promiscuous mode [ 130.091987][ T8445] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 130.117670][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 130.126811][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 130.135469][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 130.145253][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 130.154228][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 130.161640][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 130.170603][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 130.180057][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 130.188458][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 130.208400][ T8451] 8021q: adding VLAN 0 to HW filter on device bond0 [ 130.230011][ T8447] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 130.269816][ T3430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 130.280956][ T3430] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 130.293278][ T3430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 130.303230][ T3430] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 130.311712][ T3430] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 130.350248][ T8451] 8021q: adding VLAN 0 to HW filter on device team0 [ 130.357071][ T7] Bluetooth: hci0: command 0x040f tx timeout [ 130.359599][ T9755] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 130.373372][ T9755] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 130.382084][ T9755] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 130.392137][ T9755] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 130.400531][ T9755] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 130.409983][ T9755] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 130.441760][ T8449] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 130.455977][ T8449] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 130.478584][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 130.487777][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 130.497283][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 130.506439][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 130.515638][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 130.524796][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 130.534035][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 130.543426][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 130.551768][ T9719] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.558885][ T9719] bridge0: port 1(bridge_slave_0) entered forwarding state [ 130.568487][ T8443] device veth0_macvtap entered promiscuous mode [ 130.588690][ T7] Bluetooth: hci1: command 0x040f tx timeout [ 130.606747][ T8449] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 130.621504][ T8447] device veth0_vlan entered promiscuous mode [ 130.637584][ T9574] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 130.646216][ T9574] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 130.655082][ T9574] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 130.663855][ T9574] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 130.672069][ T9574] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 130.681554][ T9574] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 130.691362][ T9574] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.698491][ T9574] bridge0: port 2(bridge_slave_1) entered forwarding state [ 130.706214][ T9574] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 130.715160][ T9574] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 130.723595][ T9574] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 130.734677][ T8443] device veth1_macvtap entered promiscuous mode [ 130.760415][ T8447] device veth1_vlan entered promiscuous mode [ 130.788905][ T9574] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 130.798846][ T9574] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 130.809903][ T9574] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 130.819173][ T9574] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 130.829573][ T9574] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 130.839737][ T9574] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 130.850155][ T9574] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 130.874114][ T2960] Bluetooth: hci2: command 0x040f tx timeout [ 130.888662][ T8549] 8021q: adding VLAN 0 to HW filter on device bond0 [ 130.914493][ T2960] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 130.932962][ T2960] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 130.940771][ T2960] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 130.958829][ T2960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 130.968645][ T2960] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 130.978243][ T2960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 130.987949][ T2960] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 130.998410][ T2960] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 131.010474][ T2960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 131.019473][ T2960] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 131.044453][ T8445] device veth0_vlan entered promiscuous mode [ 131.050931][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 131.059281][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 131.068475][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 131.077766][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 131.093197][ T8443] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 131.115718][ T8549] 8021q: adding VLAN 0 to HW filter on device team0 [ 131.128603][ T8445] device veth1_vlan entered promiscuous mode [ 131.141231][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 131.149888][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 131.158425][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 131.167410][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 131.176945][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 131.186073][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 131.195461][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 131.205096][ T9719] Bluetooth: hci3: command 0x040f tx timeout [ 131.209259][ T8447] device veth0_macvtap entered promiscuous mode [ 131.252358][ T8443] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 131.265362][ T8451] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 131.278436][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 131.288010][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 131.297403][ T9663] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.304564][ T9663] bridge0: port 1(bridge_slave_0) entered forwarding state [ 131.313005][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 131.321529][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 131.330575][ T9663] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.337773][ T9663] bridge0: port 2(bridge_slave_1) entered forwarding state [ 131.346037][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 131.356502][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 131.366254][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 131.375447][ T9663] Bluetooth: hci4: command 0x040f tx timeout [ 131.414554][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 131.425270][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 131.443334][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 131.451108][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 131.461038][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 131.471392][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 131.481145][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 131.491044][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 131.500639][ T8447] device veth1_macvtap entered promiscuous mode [ 131.510735][ T8443] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 131.520902][ T8443] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 131.530088][ T8443] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 131.538991][ T8443] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 131.551103][ T8449] device veth0_vlan entered promiscuous mode [ 131.584721][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 131.597639][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 131.607419][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 131.621045][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 131.631990][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 131.643379][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 131.651630][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 131.687273][ T8549] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 131.696521][ T8447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 131.708951][ T8447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 131.721786][ T8447] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 131.730382][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 131.738663][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 131.746780][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 131.755944][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 131.767370][ T8449] device veth1_vlan entered promiscuous mode [ 131.797078][ T8447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 131.809676][ T8447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 131.824061][ T8447] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 131.836133][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 131.845646][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 131.855439][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 131.865014][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 131.875920][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 131.888457][ T8445] device veth0_macvtap entered promiscuous mode [ 131.895522][ T9663] Bluetooth: hci5: command 0x040f tx timeout [ 131.907304][ T8451] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 131.930335][ T8447] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 131.950234][ T8447] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 131.971469][ T8447] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 131.992670][ T8447] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 132.012279][ T8445] device veth1_macvtap entered promiscuous mode [ 132.091831][ T8549] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 132.170485][ T9574] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 132.185297][ T9574] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 132.205423][ T9574] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 132.225069][ T9574] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 132.240083][ T9574] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 132.283566][ T27] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 132.291632][ T27] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 132.332067][ T8445] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 132.367411][ T8445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 132.379976][ T8445] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 132.390936][ T8445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 132.403755][ T8445] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 132.415705][ T8449] device veth0_macvtap entered promiscuous mode [ 132.424344][ T7] Bluetooth: hci0: command 0x0419 tx timeout [ 132.431203][ T9756] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 132.440926][ T9756] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 132.451979][ T9756] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 132.460381][ T9756] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 132.469358][ T9756] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 132.478502][ T9756] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 132.503502][ T8445] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 132.514522][ T8445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 132.525451][ T8445] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 132.536446][ T8445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 132.548238][ T8445] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 132.559842][ T8449] device veth1_macvtap entered promiscuous mode [ 132.583568][ T3257] ieee802154 phy0 wpan0: encryption failed: -22 [ 132.590379][ T3257] ieee802154 phy1 wpan1: encryption failed: -22 [ 132.615079][ T9730] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 132.633269][ T9730] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 132.641957][ T9730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 132.671768][ T8445] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 132.685805][ T9730] Bluetooth: hci1: command 0x0419 tx timeout [ 132.689552][ T8445] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 132.700681][ T8445] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 132.713831][ T8445] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 132.820786][ T8449] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 132.841286][ T8449] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 132.851182][ T8449] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 132.863181][ T8449] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 132.873144][ T8449] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 132.884295][ T8449] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 132.896775][ T8449] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 132.905902][ T2960] Bluetooth: hci2: command 0x0419 tx timeout [ 132.913834][ T9756] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 132.924162][ T9756] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 132.933619][ T9756] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 132.942167][ T9756] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 132.973901][ T384] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 132.981029][ T8449] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 132.992518][ T384] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 133.004303][ T8449] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 133.014706][ T8449] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 133.025517][ T8449] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 133.035413][ T8449] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 133.046029][ T8449] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 133.057765][ T8449] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 133.069434][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 133.079173][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 133.088563][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 133.097834][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 133.107707][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 133.153598][ T8449] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 133.159684][ T384] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 133.170782][ T384] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 133.194182][ T8449] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 133.204096][ T8449] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 133.216214][ T8449] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 133.223081][ T9730] Bluetooth: hci3: command 0x0419 tx timeout [ 133.252549][ T9574] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 133.261707][ T9574] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 133.284091][ T9574] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 133.296251][ T8451] device veth0_vlan entered promiscuous mode [ 133.331888][ T9574] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 133.341183][ T9574] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 133.383460][ T9663] Bluetooth: hci4: command 0x0419 tx timeout [ 133.396293][ T286] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 133.407917][ T9815] IPVS: ftp: loaded support on port[0] = 21 [ 133.414299][ T286] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 133.443214][ T8549] device veth0_vlan entered promiscuous mode [ 133.472772][ T9574] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 133.478082][ T9816] IPVS: ftp: loaded support on port[0] = 21 [ 133.481063][ T9574] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 133.528438][ T9574] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 133.570707][ T8451] device veth1_vlan entered promiscuous mode [ 133.623554][ T9574] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 133.638229][ T9574] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 133.684717][ T27] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 133.728916][ T27] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 133.773113][ T8549] device veth1_vlan entered promiscuous mode [ 133.867918][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 133.880615][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 133.943385][ T19] Bluetooth: hci5: command 0x0419 tx timeout [ 134.168992][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 134.179859][ T384] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 134.190329][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 134.206988][ T384] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 134.216290][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 134.218451][ T9820] IPVS: ftp: loaded support on port[0] = 21 [ 134.237908][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 134.302448][ T8451] device veth0_macvtap entered promiscuous mode [ 134.335208][ T9887] IPVS: ftp: loaded support on port[0] = 21 [ 134.341463][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 134.362666][ T384] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 134.370681][ T384] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 134.394709][ T8451] device veth1_macvtap entered promiscuous mode 10:52:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_newnexthop={0x24, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_ENCAP_TYPE={0x6}, @NHA_FDB={0x4}]}, 0x24}}, 0x0) 10:52:35 executing program 2: ioctl$BTRFS_IOC_SET_FEATURES(0xffffffffffffffff, 0x40309439, &(0x7f0000000040)={0x0, 0x0, 0x5}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 134.446836][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 134.473064][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 134.482008][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 134.515174][ T8549] device veth0_macvtap entered promiscuous mode 10:52:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_newnexthop={0x24, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_ENCAP_TYPE={0x6}, @NHA_FDB={0x4}]}, 0x24}}, 0x0) [ 134.612052][ T384] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 134.660109][ T8549] device veth1_macvtap entered promiscuous mode [ 134.678101][ T384] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 134.691241][ T8451] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 134.720923][ T8451] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 134.746734][ T8451] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 134.772266][ T8451] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 134.782099][ T8451] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 134.812793][ T8451] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 134.862409][ T8451] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 134.882300][ T8451] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 134.916927][ T8451] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 134.959280][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 134.974857][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 134.997180][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 135.016350][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 135.034184][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 10:52:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_newnexthop={0x24, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_ENCAP_TYPE={0x6}, @NHA_FDB={0x4}]}, 0x24}}, 0x0) [ 135.599606][ T8451] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 10:52:36 executing program 1: ioctl$BTRFS_IOC_SET_FEATURES(0xffffffffffffffff, 0x40309439, &(0x7f0000000040)={0x0, 0x0, 0x5}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 10:52:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) ioctl$FIBMAP(r1, 0x1, &(0x7f00000000c0)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r1, 0x0, 0x8}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x34) sendmmsg(r3, &(0x7f0000007fc0), 0x400000000000017, 0x0) [ 135.640472][ T8451] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.696205][ T8451] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 135.742213][ T8451] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.765208][ T8451] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 135.782776][ T8451] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.813777][ T8451] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 135.842300][ T8451] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.874037][ T8451] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 135.936972][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 135.961429][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 136.016141][ T8451] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 136.051273][ T8451] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 136.092338][ T8451] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 136.101074][ T8451] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 136.194733][ T8549] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 136.226820][ T8549] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 136.253662][ T8549] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 136.302185][ T8549] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 136.312032][ T8549] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 136.372375][ T8549] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 136.408024][ T8549] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 136.442585][ T8549] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 136.462008][ T8549] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 136.493007][ T8549] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 136.525778][ T8549] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 136.553864][ T8549] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 136.577278][ T8549] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 136.599124][ T8549] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 136.620287][ T8549] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 136.660988][ T8549] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 136.673345][ T8549] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 136.684250][ T8549] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 136.697083][ T8549] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 136.707911][ T8549] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 136.719369][ T8549] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 136.738018][ T8549] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 136.849534][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 136.873249][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 136.882091][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 136.900878][ T9719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 137.111986][ T8549] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 137.122745][ T8549] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 137.131478][ T8549] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 137.151937][ T8549] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 137.447301][ T286] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 137.512566][ T286] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 137.560475][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 137.574326][ T286] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 137.618559][ T286] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 137.699162][ T9574] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 137.747599][ T221] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 137.781380][ T221] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 137.835135][ T9574] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 137.845170][ T221] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 137.907702][ T221] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 137.954624][ T9574] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 138.200755][T10048] IPVS: ftp: loaded support on port[0] = 21 [ 138.496543][T10073] IPVS: ftp: loaded support on port[0] = 21 10:52:43 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000002440)) unshare(0x40000000) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f00000003c0)=0x871, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @local}, 0x10) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000080)={0x7, 'macvtap0\x00', {0x20}}) sendto$inet(r0, 0x0, 0x0, 0x20024ffc, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x8) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000002e0001002cbd70000000000017000000dfbfe0b108adf78b9e52386812392d3aa8cb8cc32fbef8f0e8657fd41565339b845046469d7c816b76"], 0x14}}, 0x20040800) bind(r1, 0x0, 0x0) unshare(0xc030700) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000180), 0x4) unshare(0x40040400) unshare(0x4020000) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x6d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) recvmsg(r0, &(0x7f0000001500)={0x0, 0x2, &(0x7f0000002200)=[{&(0x7f00000035c0)=""/4106, 0x200045ca}], 0x1, 0x0, 0xb2c86da597010000}, 0x100) 10:52:43 executing program 2: ioctl$BTRFS_IOC_SET_FEATURES(0xffffffffffffffff, 0x40309439, &(0x7f0000000040)={0x0, 0x0, 0x5}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 10:52:43 executing program 1: ioctl$BTRFS_IOC_SET_FEATURES(0xffffffffffffffff, 0x40309439, &(0x7f0000000040)={0x0, 0x0, 0x5}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 10:52:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) ioctl$FIBMAP(r1, 0x1, &(0x7f00000000c0)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r1, 0x0, 0x8}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x34) sendmmsg(r3, &(0x7f0000007fc0), 0x400000000000017, 0x0) [ 142.676745][T10124] IPVS: ftp: loaded support on port[0] = 21 [ 142.730145][T10127] IPVS: ftp: loaded support on port[0] = 21 10:52:45 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000002440)) unshare(0x40000000) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f00000003c0)=0x871, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @local}, 0x10) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000080)={0x7, 'macvtap0\x00', {0x20}}) sendto$inet(r0, 0x0, 0x0, 0x20024ffc, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x8) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000002e0001002cbd70000000000017000000dfbfe0b108adf78b9e52386812392d3aa8cb8cc32fbef8f0e8657fd41565339b845046469d7c816b76"], 0x14}}, 0x20040800) bind(r1, 0x0, 0x0) unshare(0xc030700) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000180), 0x4) unshare(0x40040400) unshare(0x4020000) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x6d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) recvmsg(r0, &(0x7f0000001500)={0x0, 0x2, &(0x7f0000002200)=[{&(0x7f00000035c0)=""/4106, 0x200045ca}], 0x1, 0x0, 0xb2c86da597010000}, 0x100) 10:52:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) ioctl$FIBMAP(r1, 0x1, &(0x7f00000000c0)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r1, 0x0, 0x8}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x34) sendmmsg(r3, &(0x7f0000007fc0), 0x400000000000017, 0x0) 10:52:45 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xa, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x38) 10:52:45 executing program 1: ioctl$BTRFS_IOC_SET_FEATURES(0xffffffffffffffff, 0x40309439, &(0x7f0000000040)={0x0, 0x0, 0x5}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 10:52:45 executing program 2: ioctl$BTRFS_IOC_SET_FEATURES(0xffffffffffffffff, 0x40309439, &(0x7f0000000040)={0x0, 0x0, 0x5}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 10:52:45 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000002440)) unshare(0x40000000) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f00000003c0)=0x871, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @local}, 0x10) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000080)={0x7, 'macvtap0\x00', {0x20}}) sendto$inet(r0, 0x0, 0x0, 0x20024ffc, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x8) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000002e0001002cbd70000000000017000000dfbfe0b108adf78b9e52386812392d3aa8cb8cc32fbef8f0e8657fd41565339b845046469d7c816b76"], 0x14}}, 0x20040800) bind(r1, 0x0, 0x0) unshare(0xc030700) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000180), 0x4) unshare(0x40040400) unshare(0x4020000) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x6d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) recvmsg(r0, &(0x7f0000001500)={0x0, 0x2, &(0x7f0000002200)=[{&(0x7f00000035c0)=""/4106, 0x200045ca}], 0x1, 0x0, 0xb2c86da597010000}, 0x100) [ 144.243873][T10192] IPVS: ftp: loaded support on port[0] = 21 10:52:45 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xa, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x38) [ 144.310680][T10201] IPVS: ftp: loaded support on port[0] = 21 [ 144.311408][T10200] IPVS: ftp: loaded support on port[0] = 21 [ 144.396483][T10204] IPVS: ftp: loaded support on port[0] = 21 10:52:45 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xa, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x38) 10:52:45 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000002440)) unshare(0x40000000) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f00000003c0)=0x871, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @local}, 0x10) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000080)={0x7, 'macvtap0\x00', {0x20}}) sendto$inet(r0, 0x0, 0x0, 0x20024ffc, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x8) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000002e0001002cbd70000000000017000000dfbfe0b108adf78b9e52386812392d3aa8cb8cc32fbef8f0e8657fd41565339b845046469d7c816b76"], 0x14}}, 0x20040800) bind(r1, 0x0, 0x0) unshare(0xc030700) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000180), 0x4) unshare(0x40040400) unshare(0x4020000) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x6d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) recvmsg(r0, &(0x7f0000001500)={0x0, 0x2, &(0x7f0000002200)=[{&(0x7f00000035c0)=""/4106, 0x200045ca}], 0x1, 0x0, 0xb2c86da597010000}, 0x100) 10:52:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) ioctl$FIBMAP(r1, 0x1, &(0x7f00000000c0)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r1, 0x0, 0x8}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x34) sendmmsg(r3, &(0x7f0000007fc0), 0x400000000000017, 0x0) [ 144.886477][T10218] IPVS: ftp: loaded support on port[0] = 21 [ 144.947663][T10220] IPVS: ftp: loaded support on port[0] = 21 10:52:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) ioctl$FIBMAP(r1, 0x1, &(0x7f00000000c0)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r1, 0x0, 0x8}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x34) sendmmsg(r3, &(0x7f0000007fc0), 0x400000000000017, 0x0) 10:52:46 executing program 2: ioctl$BTRFS_IOC_SET_FEATURES(0xffffffffffffffff, 0x40309439, &(0x7f0000000040)={0x0, 0x0, 0x5}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 10:52:51 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000002440)) unshare(0x40000000) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f00000003c0)=0x871, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @local}, 0x10) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000080)={0x7, 'macvtap0\x00', {0x20}}) sendto$inet(r0, 0x0, 0x0, 0x20024ffc, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x8) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000002e0001002cbd70000000000017000000dfbfe0b108adf78b9e52386812392d3aa8cb8cc32fbef8f0e8657fd41565339b845046469d7c816b76"], 0x14}}, 0x20040800) bind(r1, 0x0, 0x0) unshare(0xc030700) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000180), 0x4) unshare(0x40040400) unshare(0x4020000) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x6d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) recvmsg(r0, &(0x7f0000001500)={0x0, 0x2, &(0x7f0000002200)=[{&(0x7f00000035c0)=""/4106, 0x200045ca}], 0x1, 0x0, 0xb2c86da597010000}, 0x100) 10:52:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) ioctl$FIBMAP(r1, 0x1, &(0x7f00000000c0)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r1, 0x0, 0x8}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x34) sendmmsg(r3, &(0x7f0000007fc0), 0x400000000000017, 0x0) 10:52:51 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000002440)) unshare(0x40000000) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f00000003c0)=0x871, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @local}, 0x10) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000080)={0x7, 'macvtap0\x00', {0x20}}) sendto$inet(r0, 0x0, 0x0, 0x20024ffc, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x8) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000002e0001002cbd70000000000017000000dfbfe0b108adf78b9e52386812392d3aa8cb8cc32fbef8f0e8657fd41565339b845046469d7c816b76"], 0x14}}, 0x20040800) bind(r1, 0x0, 0x0) unshare(0xc030700) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000180), 0x4) unshare(0x40040400) unshare(0x4020000) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x6d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) recvmsg(r0, &(0x7f0000001500)={0x0, 0x2, &(0x7f0000002200)=[{&(0x7f00000035c0)=""/4106, 0x200045ca}], 0x1, 0x0, 0xb2c86da597010000}, 0x100) 10:52:51 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) ioctl$FIBMAP(r1, 0x1, &(0x7f00000000c0)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r1, 0x0, 0x8}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x34) sendmmsg(r3, &(0x7f0000007fc0), 0x400000000000017, 0x0) 10:52:51 executing program 2: ioctl$BTRFS_IOC_SET_FEATURES(0xffffffffffffffff, 0x40309439, &(0x7f0000000040)={0x0, 0x0, 0x5}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 150.883864][T10396] IPVS: ftp: loaded support on port[0] = 21 [ 150.956335][T10401] IPVS: ftp: loaded support on port[0] = 21 [ 151.007019][T10403] IPVS: ftp: loaded support on port[0] = 21 [ 151.068064][T10406] IPVS: ftp: loaded support on port[0] = 21 10:52:52 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000002440)) unshare(0x40000000) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f00000003c0)=0x871, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @local}, 0x10) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000080)={0x7, 'macvtap0\x00', {0x20}}) sendto$inet(r0, 0x0, 0x0, 0x20024ffc, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x8) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000002e0001002cbd70000000000017000000dfbfe0b108adf78b9e52386812392d3aa8cb8cc32fbef8f0e8657fd41565339b845046469d7c816b76"], 0x14}}, 0x20040800) bind(r1, 0x0, 0x0) unshare(0xc030700) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000180), 0x4) unshare(0x40040400) unshare(0x4020000) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x6d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) recvmsg(r0, &(0x7f0000001500)={0x0, 0x2, &(0x7f0000002200)=[{&(0x7f00000035c0)=""/4106, 0x200045ca}], 0x1, 0x0, 0xb2c86da597010000}, 0x100) 10:52:52 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) ioctl$FIBMAP(r1, 0x1, &(0x7f00000000c0)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r1, 0x0, 0x8}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x34) sendmmsg(r3, &(0x7f0000007fc0), 0x400000000000017, 0x0) 10:52:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) ioctl$FIBMAP(r1, 0x1, &(0x7f00000000c0)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r1, 0x0, 0x8}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x34) sendmmsg(r3, &(0x7f0000007fc0), 0x400000000000017, 0x0) 10:52:52 executing program 2: ioctl$BTRFS_IOC_SET_FEATURES(0xffffffffffffffff, 0x40309439, &(0x7f0000000040)={0x0, 0x0, 0x5}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 151.826517][T10498] IPVS: ftp: loaded support on port[0] = 21 [ 151.901732][T10504] IPVS: ftp: loaded support on port[0] = 21 10:52:53 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000002440)) unshare(0x40000000) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f00000003c0)=0x871, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @local}, 0x10) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000080)={0x7, 'macvtap0\x00', {0x20}}) sendto$inet(r0, 0x0, 0x0, 0x20024ffc, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x8) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000002e0001002cbd70000000000017000000dfbfe0b108adf78b9e52386812392d3aa8cb8cc32fbef8f0e8657fd41565339b845046469d7c816b76"], 0x14}}, 0x20040800) bind(r1, 0x0, 0x0) unshare(0xc030700) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000180), 0x4) unshare(0x40040400) unshare(0x4020000) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x6d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) recvmsg(r0, &(0x7f0000001500)={0x0, 0x2, &(0x7f0000002200)=[{&(0x7f00000035c0)=""/4106, 0x200045ca}], 0x1, 0x0, 0xb2c86da597010000}, 0x100) 10:52:53 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000002440)) unshare(0x40000000) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f00000003c0)=0x871, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @local}, 0x10) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000080)={0x7, 'macvtap0\x00', {0x20}}) sendto$inet(r0, 0x0, 0x0, 0x20024ffc, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x8) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000002e0001002cbd70000000000017000000dfbfe0b108adf78b9e52386812392d3aa8cb8cc32fbef8f0e8657fd41565339b845046469d7c816b76"], 0x14}}, 0x20040800) bind(r1, 0x0, 0x0) unshare(0xc030700) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000180), 0x4) unshare(0x40040400) unshare(0x4020000) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x6d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) recvmsg(r0, &(0x7f0000001500)={0x0, 0x2, &(0x7f0000002200)=[{&(0x7f00000035c0)=""/4106, 0x200045ca}], 0x1, 0x0, 0xb2c86da597010000}, 0x100) [ 152.213723][T10512] IPVS: ftp: loaded support on port[0] = 21 [ 152.258355][T10514] IPVS: ftp: loaded support on port[0] = 21 [ 152.286698][T10515] IPVS: ftp: loaded support on port[0] = 21 [ 152.317650][T10516] IPVS: ftp: loaded support on port[0] = 21 10:52:53 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x1c, 0x4, 0x7fb, 0x0, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x2, 0x5}, 0x40) 10:52:53 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x50}, [@ldst={0x5, 0x3, 0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1}, 0x48) 10:52:53 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="400000001000010800"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000200016801c00018018000c801471"], 0x40}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 10:52:53 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x1c, 0x4, 0x7fb, 0x0, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x2, 0x5}, 0x40) 10:52:54 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="400000001000010800"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000200016801c00018018000c801471"], 0x40}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 10:52:54 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="400000001000010800"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000200016801c00018018000c801471"], 0x40}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 10:52:54 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x1c, 0x4, 0x7fb, 0x0, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x2, 0x5}, 0x40) 10:52:54 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="400000001000010800"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000200016801c00018018000c801471"], 0x40}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 10:52:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "6cfa0000000000160ffe58bb661b4b26d7000000000000002000", "7e2b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 10:52:54 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="400000001000010800"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000200016801c00018018000c801471"], 0x40}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 10:52:54 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x1c, 0x4, 0x7fb, 0x0, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x2, 0x5}, 0x40) [ 153.438222][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:52:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/net\x00') sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x3d, 0x2, 0x0, 0x1, @void}}}, @IFLA_NET_NS_FD={0x8, 0x1c, r1}]}, 0x3c}}, 0x0) 10:52:54 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="400000001000010800"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000200016801c00018018000c801471"], 0x40}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 153.565950][T10675] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 153.763108][T10697] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 154.230729][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:52:55 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x50}, [@ldst={0x5, 0x3, 0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1}, 0x48) 10:52:55 executing program 1: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r4, 0x0, 0x0}, 0x10) 10:52:55 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="400000001000010800"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000200016801c00018018000c801471"], 0x40}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 10:52:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/net\x00') sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x3d, 0x2, 0x0, 0x1, @void}}}, @IFLA_NET_NS_FD={0x8, 0x1c, r1}]}, 0x3c}}, 0x0) 10:52:55 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)="2e00000028000504d25a80648c63940d0224fc6004000f400a003d005a00000037153e370a00018003000000d1bd", 0x2e}], 0x1}, 0x0) 10:52:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "6cfa0000000000160ffe58bb661b4b26d7000000000000002000", "7e2b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 154.446494][T10706] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 154.487592][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:52:55 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)="2e00000028000504d25a80648c63940d0224fc6004000f400a003d005a00000037153e370a00018003000000d1bd", 0x2e}], 0x1}, 0x0) 10:52:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "6cfa0000000000160ffe58bb661b4b26d7000000000000002000", "7e2b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 10:52:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/net\x00') sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x3d, 0x2, 0x0, 0x1, @void}}}, @IFLA_NET_NS_FD={0x8, 0x1c, r1}]}, 0x3c}}, 0x0) [ 154.748705][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 154.779715][T10727] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:52:55 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)="2e00000028000504d25a80648c63940d0224fc6004000f400a003d005a00000037153e370a00018003000000d1bd", 0x2e}], 0x1}, 0x0) 10:52:55 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x50}, [@ldst={0x5, 0x3, 0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1}, 0x48) 10:52:55 executing program 1: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r4, 0x0, 0x0}, 0x10) 10:52:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/net\x00') sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x3d, 0x2, 0x0, 0x1, @void}}}, @IFLA_NET_NS_FD={0x8, 0x1c, r1}]}, 0x3c}}, 0x0) 10:52:56 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)="2e00000028000504d25a80648c63940d0224fc6004000f400a003d005a00000037153e370a00018003000000d1bd", 0x2e}], 0x1}, 0x0) 10:52:56 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x50}, [@ldst={0x5, 0x3, 0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1}, 0x48) [ 155.063625][T10741] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:52:56 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"/773], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="480e003f0000007e5bc5795eca00", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x48) 10:52:56 executing program 1: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r4, 0x0, 0x0}, 0x10) 10:52:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "6cfa0000000000160ffe58bb661b4b26d7000000000000002000", "7e2b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 10:52:56 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001200)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) ppoll(&(0x7f00000000c0)=[{r0}], 0x1, &(0x7f0000000080)={0x0, 0x3938700}, 0x0, 0x0) [ 155.492123][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:52:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "6cfa0000000000160ffe58bb661b4b26d7000000000000002000", "7e2b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 10:52:56 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_NETNS_FD={0x8}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}]}, 0x24}}, 0x0) 10:52:56 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb7d18ad123d27e7cf43548ee85857ad4a77cb56e0fcb3dfd4e70ebec677d6ac14c2c794f72cbf5fe31789e70227bfd8115efd90c8c48258f8dbe82e16cf0000000000000000000000000000790ae2fd45d54b107c8c8a14195e32f13799d6707432ff48bc085760314166443ce72c74f3db890e1ff15a10d91f27e9a232fe2238fff867ba8fd41b29caad2a986e0e244bd11747ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255570c16822bdffd3135480dae93c7e33bdef00000000d8fd8c79a5d0967ab7e43686b4d1e03e326beea7905ef7de375ef8bc8143df20d13c37db269971210fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd2491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b84137d5f7a6edba86a7b9a4c2f3b3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f65970600a85c9a74ca196700218f919746bb4b84c16fd56ee450e411d75ab7613b644ba7580b2a0942394ed1737517eed10300000000000000cf1a60fe2dcc1a465aa8d54cb4000053c3f01ea714a7bd4fad615ff6e2991589bbdd1ae0d1bce65c620c4a2527a82afe16e019a5e0b5ec1b1b8aafba090000c3630488edcc4a8cbd3246e962b773a75b28a51cd09cbcb3577fea6f1e9fe8cd2b532c084cbd051b4aeaf0e716b256acf183d8e55580a678c664813354f14a453b093948d49bca31a7170419bb1d32f256ff3010e69b2f0482c63ab78a74dec8b1405e7daef356602487886b6f0beb5ca9a9b31a57e25525fa0ff5c2226e79db12959e59f2c911ee035c82f1a81ef15b43d51ff1fa025bfb80674c9d0e00"/773], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="480e003f0000007e5bc5795eca00", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x48) 10:52:56 executing program 1: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r4, 0x0, 0x0}, 0x10) [ 155.755906][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:52:56 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"/773], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="480e003f0000007e5bc5795eca00", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x48) 10:52:56 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_NETNS_FD={0x8}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}]}, 0x24}}, 0x0) 10:52:56 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @null]}, 0x48) listen(r0, 0x0) unshare(0x40000000) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x2, 'wg1\x00', {0x10001}, 0x6}) r1 = accept(r0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000500)=0x1, 0x4) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x1) sendmmsg$sock(r1, &(0x7f0000000400)=[{{&(0x7f0000000100)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x2}, [@null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000180)="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", 0xff}, {&(0x7f0000000280)="425d126a40ad16477e3776d0c96c4c526b9b5abaa82b2daa24c3d07be5b2b29caf1ab642fc8315055fc3fe7130f62a7fae6bad8fd0cf38fa5739152192b5f7dd243718b57cc329bd06089ba2e7b454cb9ece600d36151260020877f6fb9be83025db314fa7887328d14a5687294d86f1904beb6c58244fc1bae117d2d446b1c8a2b53004c88bf9b58ce85895fba15ba49c3924c82bda38176f76e0bfb1354f578b13adb49f5822d6620e9e0bac1f282541b3b1add3ae4d3f0a10d29566ec700f6c63e13511dae3ce59a3b61302c11ebd612976ba2c3eed2444c3f64a722940b7c3e7cca41867d8c521eb6b4cca5197", 0xef}, {&(0x7f0000000380)="2035e387760c5b269959a99b1b256d7a952e2f8e114bc23429fae99f3a0ab09023dff6f0a3e0db03", 0x28}], 0x3}}], 0x1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x1, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f00000005c0)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x7}}}}}}}, 0x0) ioctl$SIOCAX25CTLCON(0xffffffffffffffff, 0x89e8, &(0x7f0000000480)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x2, 0x977, 0x2, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null]}) 10:52:57 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"/773], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="480e003f0000007e5bc5795eca00", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x48) 10:52:57 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_NETNS_FD={0x8}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}]}, 0x24}}, 0x0) 10:52:57 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001200)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) ppoll(&(0x7f00000000c0)=[{r0}], 0x1, &(0x7f0000000080)={0x0, 0x3938700}, 0x0, 0x0) [ 156.119945][T10789] IPVS: ftp: loaded support on port[0] = 21 10:52:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "6cfa0000000000160ffe58bb661b4b26d7000000000000002000", "7e2b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 10:52:57 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001200)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) ppoll(&(0x7f00000000c0)=[{r0}], 0x1, &(0x7f0000000080)={0x0, 0x3938700}, 0x0, 0x0) [ 156.506903][T10789] IPVS: ftp: loaded support on port[0] = 21 [ 156.611151][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:52:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "6cfa0000000000160ffe58bb661b4b26d7000000000000002000", "7e2b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 10:52:57 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_NETNS_FD={0x8}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}]}, 0x24}}, 0x0) 10:52:57 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001200)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) ppoll(&(0x7f00000000c0)=[{r0}], 0x1, &(0x7f0000000080)={0x0, 0x3938700}, 0x0, 0x0) 10:52:57 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001200)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) ppoll(&(0x7f00000000c0)=[{r0}], 0x1, &(0x7f0000000080)={0x0, 0x3938700}, 0x0, 0x0) 10:52:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x20, 0x13, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) [ 156.840545][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:52:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x20, 0x13, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) 10:53:00 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @null]}, 0x48) listen(r0, 0x0) unshare(0x40000000) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x2, 'wg1\x00', {0x10001}, 0x6}) r1 = accept(r0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000500)=0x1, 0x4) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x1) sendmmsg$sock(r1, &(0x7f0000000400)=[{{&(0x7f0000000100)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x2}, [@null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000180)="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", 0xff}, {&(0x7f0000000280)="425d126a40ad16477e3776d0c96c4c526b9b5abaa82b2daa24c3d07be5b2b29caf1ab642fc8315055fc3fe7130f62a7fae6bad8fd0cf38fa5739152192b5f7dd243718b57cc329bd06089ba2e7b454cb9ece600d36151260020877f6fb9be83025db314fa7887328d14a5687294d86f1904beb6c58244fc1bae117d2d446b1c8a2b53004c88bf9b58ce85895fba15ba49c3924c82bda38176f76e0bfb1354f578b13adb49f5822d6620e9e0bac1f282541b3b1add3ae4d3f0a10d29566ec700f6c63e13511dae3ce59a3b61302c11ebd612976ba2c3eed2444c3f64a722940b7c3e7cca41867d8c521eb6b4cca5197", 0xef}, {&(0x7f0000000380)="2035e387760c5b269959a99b1b256d7a952e2f8e114bc23429fae99f3a0ab09023dff6f0a3e0db03", 0x28}], 0x3}}], 0x1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x1, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f00000005c0)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x7}}}}}}}, 0x0) ioctl$SIOCAX25CTLCON(0xffffffffffffffff, 0x89e8, &(0x7f0000000480)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x2, 0x977, 0x2, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null]}) 10:53:00 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001200)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) ppoll(&(0x7f00000000c0)=[{r0}], 0x1, &(0x7f0000000080)={0x0, 0x3938700}, 0x0, 0x0) 10:53:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x20, 0x13, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) 10:53:00 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001200)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) ppoll(&(0x7f00000000c0)=[{r0}], 0x1, &(0x7f0000000080)={0x0, 0x3938700}, 0x0, 0x0) 10:53:00 executing program 4: unshare(0x6c060000) socket$inet6(0x10, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x200088c4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000018c0)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c1030000030000002004000000000000800200000000000000000000800000005003000050030000500300005003000050030000030000000000000000000000fe8000000000000000000000000000bbff020000000000000000000000000001000000000000000000623a64130000000000000000000000000000000000000076657468315f746f5f626f6e640000006e657470636930000000000000000000000000000000000000000000000000000000000000e824a52e1d000000000000000000000000000000000000500280020000000001000000000000000000000000000000000000005001686173686c696d697400000000000000000000000000000000000100000274e25745b4736c6176655f3100080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000f60000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000400000000000000b61a000800000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a6b616c6c657231000000000000000000000000000004000000000000000000000005000000a600000100000000005f0200000000003000434f4e4e4d41524b00000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000a800d0000000000000000000000000000000000000000000000000002800434c4153534946590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000700000000000000000000000000fefffffff9ac5229"], 0x1) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x4c85, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) recvfrom$inet6(r1, &(0x7f0000000000)=""/35, 0xffffffffffffff13, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x600000000000004) 10:53:00 executing program 0: socket$inet6(0xa, 0x5, 0x20) socketpair(0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000006d80)='mptcp_pm\x00', 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, 0x0, 0x48840) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) getpeername$packet(0xffffffffffffffff, &(0x7f0000008800), &(0x7f0000008840)=0x14) [ 159.521704][T10890] IPVS: ftp: loaded support on port[0] = 21 [ 159.548430][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:53:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x20, 0x13, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) [ 159.592069][T10899] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING [ 159.689564][T10910] IPVS: ftp: loaded support on port[0] = 21 10:53:00 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @null]}, 0x48) listen(r0, 0x0) unshare(0x40000000) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x2, 'wg1\x00', {0x10001}, 0x6}) r1 = accept(r0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000500)=0x1, 0x4) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x1) sendmmsg$sock(r1, &(0x7f0000000400)=[{{&(0x7f0000000100)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x2}, [@null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000180)="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", 0xff}, {&(0x7f0000000280)="425d126a40ad16477e3776d0c96c4c526b9b5abaa82b2daa24c3d07be5b2b29caf1ab642fc8315055fc3fe7130f62a7fae6bad8fd0cf38fa5739152192b5f7dd243718b57cc329bd06089ba2e7b454cb9ece600d36151260020877f6fb9be83025db314fa7887328d14a5687294d86f1904beb6c58244fc1bae117d2d446b1c8a2b53004c88bf9b58ce85895fba15ba49c3924c82bda38176f76e0bfb1354f578b13adb49f5822d6620e9e0bac1f282541b3b1add3ae4d3f0a10d29566ec700f6c63e13511dae3ce59a3b61302c11ebd612976ba2c3eed2444c3f64a722940b7c3e7cca41867d8c521eb6b4cca5197", 0xef}, {&(0x7f0000000380)="2035e387760c5b269959a99b1b256d7a952e2f8e114bc23429fae99f3a0ab09023dff6f0a3e0db03", 0x28}], 0x3}}], 0x1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x1, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f00000005c0)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x7}}}}}}}, 0x0) ioctl$SIOCAX25CTLCON(0xffffffffffffffff, 0x89e8, &(0x7f0000000480)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x2, 0x977, 0x2, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null]}) 10:53:00 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @null]}, 0x48) listen(r0, 0x0) unshare(0x40000000) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x2, 'wg1\x00', {0x10001}, 0x6}) r1 = accept(r0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000500)=0x1, 0x4) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x1) sendmmsg$sock(r1, &(0x7f0000000400)=[{{&(0x7f0000000100)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x2}, [@null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000180)="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", 0xff}, {&(0x7f0000000280)="425d126a40ad16477e3776d0c96c4c526b9b5abaa82b2daa24c3d07be5b2b29caf1ab642fc8315055fc3fe7130f62a7fae6bad8fd0cf38fa5739152192b5f7dd243718b57cc329bd06089ba2e7b454cb9ece600d36151260020877f6fb9be83025db314fa7887328d14a5687294d86f1904beb6c58244fc1bae117d2d446b1c8a2b53004c88bf9b58ce85895fba15ba49c3924c82bda38176f76e0bfb1354f578b13adb49f5822d6620e9e0bac1f282541b3b1add3ae4d3f0a10d29566ec700f6c63e13511dae3ce59a3b61302c11ebd612976ba2c3eed2444c3f64a722940b7c3e7cca41867d8c521eb6b4cca5197", 0xef}, {&(0x7f0000000380)="2035e387760c5b269959a99b1b256d7a952e2f8e114bc23429fae99f3a0ab09023dff6f0a3e0db03", 0x28}], 0x3}}], 0x1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x1, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f00000005c0)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x7}}}}}}}, 0x0) ioctl$SIOCAX25CTLCON(0xffffffffffffffff, 0x89e8, &(0x7f0000000480)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x2, 0x977, 0x2, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null]}) 10:53:00 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @null]}, 0x48) listen(r0, 0x0) unshare(0x40000000) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x2, 'wg1\x00', {0x10001}, 0x6}) r1 = accept(r0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000500)=0x1, 0x4) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x1) sendmmsg$sock(r1, &(0x7f0000000400)=[{{&(0x7f0000000100)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x2}, [@null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000180)="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", 0xff}, {&(0x7f0000000280)="425d126a40ad16477e3776d0c96c4c526b9b5abaa82b2daa24c3d07be5b2b29caf1ab642fc8315055fc3fe7130f62a7fae6bad8fd0cf38fa5739152192b5f7dd243718b57cc329bd06089ba2e7b454cb9ece600d36151260020877f6fb9be83025db314fa7887328d14a5687294d86f1904beb6c58244fc1bae117d2d446b1c8a2b53004c88bf9b58ce85895fba15ba49c3924c82bda38176f76e0bfb1354f578b13adb49f5822d6620e9e0bac1f282541b3b1add3ae4d3f0a10d29566ec700f6c63e13511dae3ce59a3b61302c11ebd612976ba2c3eed2444c3f64a722940b7c3e7cca41867d8c521eb6b4cca5197", 0xef}, {&(0x7f0000000380)="2035e387760c5b269959a99b1b256d7a952e2f8e114bc23429fae99f3a0ab09023dff6f0a3e0db03", 0x28}], 0x3}}], 0x1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x1, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f00000005c0)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x7}}}}}}}, 0x0) ioctl$SIOCAX25CTLCON(0xffffffffffffffff, 0x89e8, &(0x7f0000000480)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x2, 0x977, 0x2, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null]}) 10:53:01 executing program 0: socket$inet6(0xa, 0x5, 0x20) socketpair(0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000006d80)='mptcp_pm\x00', 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, 0x0, 0x48840) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) getpeername$packet(0xffffffffffffffff, &(0x7f0000008800), &(0x7f0000008840)=0x14) 10:53:01 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @null]}, 0x48) listen(r0, 0x0) unshare(0x40000000) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x2, 'wg1\x00', {0x10001}, 0x6}) r1 = accept(r0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000500)=0x1, 0x4) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x1) sendmmsg$sock(r1, &(0x7f0000000400)=[{{&(0x7f0000000100)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x2}, [@null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000180)="b2491f20304aeb3bac0df94d01b3a25f121c70d173b8b22b2184a8c30476a26f531946b869d5ae40359eceacd6fc14759d49c18dc83a9f89c5e202b51bbfe25258558e38bfa1cd383266cade7a1381d3a30178983a9eeb23b9bb1153d0e56c92f801593ccf668730ff1a7090e2864d42cc193bafcd68ea385735ce8bb959850dd763a9f057f06e82d1b6f66ec2c3c6ff47f59ec8ff1b83ba28cff77ae88beacb6d3b46977d3747236b9e468467e41bb5aec437ff7ec03501fa764a79a588a98f39766a50db9ce444b7d8b4990c3508b4b4a8c9c104c6e1987c2af9a7a441da4237a572e463ce6eb52819c11d40b80c0e49edd7d0866d0edc6377cab349da24", 0xff}, {&(0x7f0000000280)="425d126a40ad16477e3776d0c96c4c526b9b5abaa82b2daa24c3d07be5b2b29caf1ab642fc8315055fc3fe7130f62a7fae6bad8fd0cf38fa5739152192b5f7dd243718b57cc329bd06089ba2e7b454cb9ece600d36151260020877f6fb9be83025db314fa7887328d14a5687294d86f1904beb6c58244fc1bae117d2d446b1c8a2b53004c88bf9b58ce85895fba15ba49c3924c82bda38176f76e0bfb1354f578b13adb49f5822d6620e9e0bac1f282541b3b1add3ae4d3f0a10d29566ec700f6c63e13511dae3ce59a3b61302c11ebd612976ba2c3eed2444c3f64a722940b7c3e7cca41867d8c521eb6b4cca5197", 0xef}, {&(0x7f0000000380)="2035e387760c5b269959a99b1b256d7a952e2f8e114bc23429fae99f3a0ab09023dff6f0a3e0db03", 0x28}], 0x3}}], 0x1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x1, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f00000005c0)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x7}}}}}}}, 0x0) ioctl$SIOCAX25CTLCON(0xffffffffffffffff, 0x89e8, &(0x7f0000000480)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x2, 0x977, 0x2, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null]}) [ 160.368154][T10974] IPVS: ftp: loaded support on port[0] = 21 [ 160.413673][T10978] IPVS: ftp: loaded support on port[0] = 21 [ 160.423014][T10975] IPVS: ftp: loaded support on port[0] = 21 [ 160.462682][T10981] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING 10:53:01 executing program 0: socket$inet6(0xa, 0x5, 0x20) socketpair(0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000006d80)='mptcp_pm\x00', 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, 0x0, 0x48840) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) getpeername$packet(0xffffffffffffffff, &(0x7f0000008800), &(0x7f0000008840)=0x14) [ 160.725337][T11014] IPVS: ftp: loaded support on port[0] = 21 10:53:02 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @null]}, 0x48) listen(r0, 0x0) unshare(0x40000000) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x2, 'wg1\x00', {0x10001}, 0x6}) r1 = accept(r0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000500)=0x1, 0x4) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x1) sendmmsg$sock(r1, &(0x7f0000000400)=[{{&(0x7f0000000100)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x2}, [@null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000180)="b2491f20304aeb3bac0df94d01b3a25f121c70d173b8b22b2184a8c30476a26f531946b869d5ae40359eceacd6fc14759d49c18dc83a9f89c5e202b51bbfe25258558e38bfa1cd383266cade7a1381d3a30178983a9eeb23b9bb1153d0e56c92f801593ccf668730ff1a7090e2864d42cc193bafcd68ea385735ce8bb959850dd763a9f057f06e82d1b6f66ec2c3c6ff47f59ec8ff1b83ba28cff77ae88beacb6d3b46977d3747236b9e468467e41bb5aec437ff7ec03501fa764a79a588a98f39766a50db9ce444b7d8b4990c3508b4b4a8c9c104c6e1987c2af9a7a441da4237a572e463ce6eb52819c11d40b80c0e49edd7d0866d0edc6377cab349da24", 0xff}, {&(0x7f0000000280)="425d126a40ad16477e3776d0c96c4c526b9b5abaa82b2daa24c3d07be5b2b29caf1ab642fc8315055fc3fe7130f62a7fae6bad8fd0cf38fa5739152192b5f7dd243718b57cc329bd06089ba2e7b454cb9ece600d36151260020877f6fb9be83025db314fa7887328d14a5687294d86f1904beb6c58244fc1bae117d2d446b1c8a2b53004c88bf9b58ce85895fba15ba49c3924c82bda38176f76e0bfb1354f578b13adb49f5822d6620e9e0bac1f282541b3b1add3ae4d3f0a10d29566ec700f6c63e13511dae3ce59a3b61302c11ebd612976ba2c3eed2444c3f64a722940b7c3e7cca41867d8c521eb6b4cca5197", 0xef}, {&(0x7f0000000380)="2035e387760c5b269959a99b1b256d7a952e2f8e114bc23429fae99f3a0ab09023dff6f0a3e0db03", 0x28}], 0x3}}], 0x1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x1, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f00000005c0)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x7}}}}}}}, 0x0) ioctl$SIOCAX25CTLCON(0xffffffffffffffff, 0x89e8, &(0x7f0000000480)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x2, 0x977, 0x2, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null]}) 10:53:02 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @null]}, 0x48) listen(r0, 0x0) unshare(0x40000000) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x2, 'wg1\x00', {0x10001}, 0x6}) r1 = accept(r0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000500)=0x1, 0x4) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x1) sendmmsg$sock(r1, &(0x7f0000000400)=[{{&(0x7f0000000100)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x2}, [@null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000180)="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", 0xff}, {&(0x7f0000000280)="425d126a40ad16477e3776d0c96c4c526b9b5abaa82b2daa24c3d07be5b2b29caf1ab642fc8315055fc3fe7130f62a7fae6bad8fd0cf38fa5739152192b5f7dd243718b57cc329bd06089ba2e7b454cb9ece600d36151260020877f6fb9be83025db314fa7887328d14a5687294d86f1904beb6c58244fc1bae117d2d446b1c8a2b53004c88bf9b58ce85895fba15ba49c3924c82bda38176f76e0bfb1354f578b13adb49f5822d6620e9e0bac1f282541b3b1add3ae4d3f0a10d29566ec700f6c63e13511dae3ce59a3b61302c11ebd612976ba2c3eed2444c3f64a722940b7c3e7cca41867d8c521eb6b4cca5197", 0xef}, {&(0x7f0000000380)="2035e387760c5b269959a99b1b256d7a952e2f8e114bc23429fae99f3a0ab09023dff6f0a3e0db03", 0x28}], 0x3}}], 0x1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x1, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f00000005c0)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x7}}}}}}}, 0x0) ioctl$SIOCAX25CTLCON(0xffffffffffffffff, 0x89e8, &(0x7f0000000480)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x2, 0x977, 0x2, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null]}) 10:53:02 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @null]}, 0x48) listen(r0, 0x0) unshare(0x40000000) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x2, 'wg1\x00', {0x10001}, 0x6}) r1 = accept(r0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000500)=0x1, 0x4) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x1) sendmmsg$sock(r1, &(0x7f0000000400)=[{{&(0x7f0000000100)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x2}, [@null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000180)="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", 0xff}, {&(0x7f0000000280)="425d126a40ad16477e3776d0c96c4c526b9b5abaa82b2daa24c3d07be5b2b29caf1ab642fc8315055fc3fe7130f62a7fae6bad8fd0cf38fa5739152192b5f7dd243718b57cc329bd06089ba2e7b454cb9ece600d36151260020877f6fb9be83025db314fa7887328d14a5687294d86f1904beb6c58244fc1bae117d2d446b1c8a2b53004c88bf9b58ce85895fba15ba49c3924c82bda38176f76e0bfb1354f578b13adb49f5822d6620e9e0bac1f282541b3b1add3ae4d3f0a10d29566ec700f6c63e13511dae3ce59a3b61302c11ebd612976ba2c3eed2444c3f64a722940b7c3e7cca41867d8c521eb6b4cca5197", 0xef}, {&(0x7f0000000380)="2035e387760c5b269959a99b1b256d7a952e2f8e114bc23429fae99f3a0ab09023dff6f0a3e0db03", 0x28}], 0x3}}], 0x1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x1, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f00000005c0)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x7}}}}}}}, 0x0) ioctl$SIOCAX25CTLCON(0xffffffffffffffff, 0x89e8, &(0x7f0000000480)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x2, 0x977, 0x2, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null]}) [ 161.486795][T11091] IPVS: ftp: loaded support on port[0] = 21 [ 161.493089][T11092] IPVS: ftp: loaded support on port[0] = 21 [ 161.541510][T11093] IPVS: ftp: loaded support on port[0] = 21 10:53:03 executing program 4: unshare(0x6c060000) socket$inet6(0x10, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x200088c4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000018c0)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c1030000030000002004000000000000800200000000000000000000800000005003000050030000500300005003000050030000030000000000000000000000fe8000000000000000000000000000bbff020000000000000000000000000001000000000000000000623a64130000000000000000000000000000000000000076657468315f746f5f626f6e640000006e657470636930000000000000000000000000000000000000000000000000000000000000e824a52e1d000000000000000000000000000000000000500280020000000001000000000000000000000000000000000000005001686173686c696d697400000000000000000000000000000000000100000274e25745b4736c6176655f3100080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000f60000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000400000000000000b61a000800000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a6b616c6c657231000000000000000000000000000004000000000000000000000005000000a600000100000000005f0200000000003000434f4e4e4d41524b00000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000a800d0000000000000000000000000000000000000000000000000002800434c4153534946590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000700000000000000000000000000fefffffff9ac5229"], 0x1) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x4c85, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) recvfrom$inet6(r1, &(0x7f0000000000)=""/35, 0xffffffffffffff13, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x600000000000004) 10:53:03 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @null]}, 0x48) listen(r0, 0x0) unshare(0x40000000) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x2, 'wg1\x00', {0x10001}, 0x6}) r1 = accept(r0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000500)=0x1, 0x4) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x1) sendmmsg$sock(r1, &(0x7f0000000400)=[{{&(0x7f0000000100)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x2}, [@null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000180)="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", 0xff}, {&(0x7f0000000280)="425d126a40ad16477e3776d0c96c4c526b9b5abaa82b2daa24c3d07be5b2b29caf1ab642fc8315055fc3fe7130f62a7fae6bad8fd0cf38fa5739152192b5f7dd243718b57cc329bd06089ba2e7b454cb9ece600d36151260020877f6fb9be83025db314fa7887328d14a5687294d86f1904beb6c58244fc1bae117d2d446b1c8a2b53004c88bf9b58ce85895fba15ba49c3924c82bda38176f76e0bfb1354f578b13adb49f5822d6620e9e0bac1f282541b3b1add3ae4d3f0a10d29566ec700f6c63e13511dae3ce59a3b61302c11ebd612976ba2c3eed2444c3f64a722940b7c3e7cca41867d8c521eb6b4cca5197", 0xef}, {&(0x7f0000000380)="2035e387760c5b269959a99b1b256d7a952e2f8e114bc23429fae99f3a0ab09023dff6f0a3e0db03", 0x28}], 0x3}}], 0x1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x1, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f00000005c0)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x7}}}}}}}, 0x0) ioctl$SIOCAX25CTLCON(0xffffffffffffffff, 0x89e8, &(0x7f0000000480)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x2, 0x977, 0x2, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null]}) 10:53:03 executing program 0: socket$inet6(0xa, 0x5, 0x20) socketpair(0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000006d80)='mptcp_pm\x00', 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, 0x0, 0x48840) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) getpeername$packet(0xffffffffffffffff, &(0x7f0000008800), &(0x7f0000008840)=0x14) 10:53:03 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @null]}, 0x48) listen(r0, 0x0) unshare(0x40000000) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x2, 'wg1\x00', {0x10001}, 0x6}) r1 = accept(r0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000500)=0x1, 0x4) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x1) sendmmsg$sock(r1, &(0x7f0000000400)=[{{&(0x7f0000000100)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x2}, [@null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000180)="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", 0xff}, {&(0x7f0000000280)="425d126a40ad16477e3776d0c96c4c526b9b5abaa82b2daa24c3d07be5b2b29caf1ab642fc8315055fc3fe7130f62a7fae6bad8fd0cf38fa5739152192b5f7dd243718b57cc329bd06089ba2e7b454cb9ece600d36151260020877f6fb9be83025db314fa7887328d14a5687294d86f1904beb6c58244fc1bae117d2d446b1c8a2b53004c88bf9b58ce85895fba15ba49c3924c82bda38176f76e0bfb1354f578b13adb49f5822d6620e9e0bac1f282541b3b1add3ae4d3f0a10d29566ec700f6c63e13511dae3ce59a3b61302c11ebd612976ba2c3eed2444c3f64a722940b7c3e7cca41867d8c521eb6b4cca5197", 0xef}, {&(0x7f0000000380)="2035e387760c5b269959a99b1b256d7a952e2f8e114bc23429fae99f3a0ab09023dff6f0a3e0db03", 0x28}], 0x3}}], 0x1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x1, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f00000005c0)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x7}}}}}}}, 0x0) ioctl$SIOCAX25CTLCON(0xffffffffffffffff, 0x89e8, &(0x7f0000000480)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x2, 0x977, 0x2, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null]}) 10:53:03 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @null]}, 0x48) listen(r0, 0x0) unshare(0x40000000) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x2, 'wg1\x00', {0x10001}, 0x6}) r1 = accept(r0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000500)=0x1, 0x4) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x1) sendmmsg$sock(r1, &(0x7f0000000400)=[{{&(0x7f0000000100)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x2}, [@null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000180)="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", 0xff}, {&(0x7f0000000280)="425d126a40ad16477e3776d0c96c4c526b9b5abaa82b2daa24c3d07be5b2b29caf1ab642fc8315055fc3fe7130f62a7fae6bad8fd0cf38fa5739152192b5f7dd243718b57cc329bd06089ba2e7b454cb9ece600d36151260020877f6fb9be83025db314fa7887328d14a5687294d86f1904beb6c58244fc1bae117d2d446b1c8a2b53004c88bf9b58ce85895fba15ba49c3924c82bda38176f76e0bfb1354f578b13adb49f5822d6620e9e0bac1f282541b3b1add3ae4d3f0a10d29566ec700f6c63e13511dae3ce59a3b61302c11ebd612976ba2c3eed2444c3f64a722940b7c3e7cca41867d8c521eb6b4cca5197", 0xef}, {&(0x7f0000000380)="2035e387760c5b269959a99b1b256d7a952e2f8e114bc23429fae99f3a0ab09023dff6f0a3e0db03", 0x28}], 0x3}}], 0x1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x1, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f00000005c0)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x7}}}}}}}, 0x0) ioctl$SIOCAX25CTLCON(0xffffffffffffffff, 0x89e8, &(0x7f0000000480)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x2, 0x977, 0x2, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null]}) 10:53:03 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @null]}, 0x48) listen(r0, 0x0) unshare(0x40000000) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000440)={0x2, 'wg1\x00', {0x10001}, 0x6}) r1 = accept(r0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000500)=0x1, 0x4) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x1) sendmmsg$sock(r1, &(0x7f0000000400)=[{{&(0x7f0000000100)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x2}, [@null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000180)="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", 0xff}, {&(0x7f0000000280)="425d126a40ad16477e3776d0c96c4c526b9b5abaa82b2daa24c3d07be5b2b29caf1ab642fc8315055fc3fe7130f62a7fae6bad8fd0cf38fa5739152192b5f7dd243718b57cc329bd06089ba2e7b454cb9ece600d36151260020877f6fb9be83025db314fa7887328d14a5687294d86f1904beb6c58244fc1bae117d2d446b1c8a2b53004c88bf9b58ce85895fba15ba49c3924c82bda38176f76e0bfb1354f578b13adb49f5822d6620e9e0bac1f282541b3b1add3ae4d3f0a10d29566ec700f6c63e13511dae3ce59a3b61302c11ebd612976ba2c3eed2444c3f64a722940b7c3e7cca41867d8c521eb6b4cca5197", 0xef}, {&(0x7f0000000380)="2035e387760c5b269959a99b1b256d7a952e2f8e114bc23429fae99f3a0ab09023dff6f0a3e0db03", 0x28}], 0x3}}], 0x1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x1, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f00000005c0)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x7}}}}}}}, 0x0) ioctl$SIOCAX25CTLCON(0xffffffffffffffff, 0x89e8, &(0x7f0000000480)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x2, 0x977, 0x2, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null]}) [ 162.703457][T11180] IPVS: ftp: loaded support on port[0] = 21 [ 162.704563][T11179] IPVS: ftp: loaded support on port[0] = 21 [ 162.736948][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 162.764762][T11184] IPVS: ftp: loaded support on port[0] = 21 [ 162.765647][T11181] IPVS: ftp: loaded support on port[0] = 21 [ 162.780187][T11185] IPVS: ftp: loaded support on port[0] = 21 [ 162.827898][T11195] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING 10:53:04 executing program 0: unshare(0x6c060000) socket$inet6(0x10, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x200088c4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000018c0)=ANY=[@ANYBLOB="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"], 0x1) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x4c85, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) recvfrom$inet6(r1, &(0x7f0000000000)=""/35, 0xffffffffffffff13, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x600000000000004) [ 163.307089][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 163.346206][T11279] IPVS: ftp: loaded support on port[0] = 21 [ 163.414947][T11295] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING 10:53:04 executing program 1: unshare(0x6c060000) socket$inet6(0x10, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x200088c4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000018c0)=ANY=[@ANYBLOB="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"], 0x1) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x4c85, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) recvfrom$inet6(r1, &(0x7f0000000000)=""/35, 0xffffffffffffff13, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x600000000000004) 10:53:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@getqdisc={0x24, 0x26, 0x301}, 0x24}}, 0x0) 10:53:04 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) ioctl$PPPIOCSPASS(r0, 0x8008743f, &(0x7f0000000100)={0x0, 0x0}) 10:53:05 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000100)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(r2, &(0x7f0000002400)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x10003, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) 10:53:05 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) ioctl$PPPIOCSPASS(r0, 0x8008743f, &(0x7f0000000100)={0x0, 0x0}) [ 164.608686][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 164.624375][T11343] IPVS: ftp: loaded support on port[0] = 21 [ 164.719439][T11345] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING 10:53:06 executing program 4: unshare(0x6c060000) socket$inet6(0x10, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x200088c4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000018c0)=ANY=[@ANYBLOB="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"], 0x1) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x4c85, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) recvfrom$inet6(r1, &(0x7f0000000000)=""/35, 0xffffffffffffff13, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x600000000000004) 10:53:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@getqdisc={0x24, 0x26, 0x301}, 0x24}}, 0x0) 10:53:06 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000100)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(r2, &(0x7f0000002400)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x10003, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) 10:53:06 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) ioctl$PPPIOCSPASS(r0, 0x8008743f, &(0x7f0000000100)={0x0, 0x0}) 10:53:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@getqdisc={0x24, 0x26, 0x301}, 0x24}}, 0x0) [ 166.097449][T11386] IPVS: ftp: loaded support on port[0] = 21 [ 166.155853][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:53:07 executing program 0: unshare(0x6c060000) socket$inet6(0x10, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x200088c4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000018c0)=ANY=[@ANYBLOB="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"], 0x1) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x4c85, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) recvfrom$inet6(r1, &(0x7f0000000000)=""/35, 0xffffffffffffff13, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x600000000000004) [ 166.270437][T11387] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING 10:53:07 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000100)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(r2, &(0x7f0000002400)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x10003, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) [ 166.580888][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 166.594483][T11420] IPVS: ftp: loaded support on port[0] = 21 [ 166.629597][T11421] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING 10:53:08 executing program 1: unshare(0x6c060000) socket$inet6(0x10, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x200088c4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000018c0)=ANY=[@ANYBLOB="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"], 0x1) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x4c85, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) recvfrom$inet6(r1, &(0x7f0000000000)=""/35, 0xffffffffffffff13, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x600000000000004) 10:53:08 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) ioctl$PPPIOCSPASS(r0, 0x8008743f, &(0x7f0000000100)={0x0, 0x0}) 10:53:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@getqdisc={0x24, 0x26, 0x301}, 0x24}}, 0x0) 10:53:08 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000100)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(r2, &(0x7f0000002400)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x10003, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) 10:53:08 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000100)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(r2, &(0x7f0000002400)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x10003, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) [ 167.852781][T11461] IPVS: ftp: loaded support on port[0] = 21 [ 167.866261][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 167.964032][T11463] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING 10:53:09 executing program 4: unshare(0x6c060000) socket$inet6(0x10, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x200088c4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000018c0)=ANY=[@ANYBLOB="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"], 0x1) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x4c85, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) recvfrom$inet6(r1, &(0x7f0000000000)=""/35, 0xffffffffffffff13, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x600000000000004) 10:53:09 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x30, 0x0, 0x0) 10:53:09 executing program 2: syz_emit_ethernet(0x27f, &(0x7f00000003c0)=ANY=[@ANYBLOB="4fc0c674f48caaaaaaaaaaaa86dd6798f2ed024900810000000000000000000000008000000000000000000000000000ff"], 0x0) 10:53:10 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x30, 0x0, 0x0) 10:53:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0x2000}, 0x40) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, 0x0}, 0x20) 10:53:10 executing program 0: unshare(0x6c060000) socket$inet6(0x10, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x200088c4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000018c0)=ANY=[@ANYBLOB="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"], 0x1) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x4c85, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) recvfrom$inet6(r1, &(0x7f0000000000)=""/35, 0xffffffffffffff13, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x600000000000004) [ 169.267737][T11497] IPVS: ftp: loaded support on port[0] = 21 [ 169.289250][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:53:10 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000100)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(r2, &(0x7f0000002400)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x10003, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) [ 169.449518][T11498] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING [ 169.887438][T11527] IPVS: ftp: loaded support on port[0] = 21 [ 169.900897][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 170.008462][T11528] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING 10:53:11 executing program 1: unshare(0x6c060000) socket$inet6(0x10, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x200088c4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000018c0)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c1030000030000002004000000000000800200000000000000000000800000005003000050030000500300005003000050030000030000000000000000000000fe8000000000000000000000000000bbff020000000000000000000000000001000000000000000000623a64130000000000000000000000000000000000000076657468315f746f5f626f6e640000006e657470636930000000000000000000000000000000000000000000000000000000000000e824a52e1d000000000000000000000000000000000000500280020000000001000000000000000000000000000000000000005001686173686c696d697400000000000000000000000000000000000100000274e25745b4736c6176655f3100080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000f60000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000400000000000000b61a000800000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a6b616c6c657231000000000000000000000000000004000000000000000000000005000000a600000100000000005f0200000000003000434f4e4e4d41524b00000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000a800d0000000000000000000000000000000000000000000000000002800434c4153534946590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000700000000000000000000000000fefffffff9ac5229"], 0x1) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x4c85, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) recvfrom$inet6(r1, &(0x7f0000000000)=""/35, 0xffffffffffffff13, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x600000000000004) 10:53:11 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x30, 0x0, 0x0) 10:53:11 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0x2000}, 0x40) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, 0x0}, 0x20) 10:53:11 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x30, 0x0, 0x0) [ 170.849928][T11561] IPVS: ftp: loaded support on port[0] = 21 [ 170.861174][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:53:11 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0x2000}, 0x40) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, 0x0}, 0x20) [ 170.934969][T11562] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING 10:53:12 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000100)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(r2, &(0x7f0000002400)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x10003, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) 10:53:12 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0x2000}, 0x40) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, 0x0}, 0x20) 10:53:12 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0x2000}, 0x40) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, 0x0}, 0x20) 10:53:13 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8992, &(0x7f0000000040)={'vlan0\x00', @ifru_hwaddr=@remote}) 10:53:13 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000140)={0x1f, 0xffff, 0x3}, 0x6) write(r0, &(0x7f0000000100)="0a00020001007b", 0x7) 10:53:13 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0x2000}, 0x40) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, 0x0}, 0x20) 10:53:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)={0x12, 0x22, 0x8, 0x3336}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f00000001c0), &(0x7f00000000c0)=@tcp=r0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, 0x0, &(0x7f00000001c0)=""/146}, 0x20) 10:53:14 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0x2000}, 0x40) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, 0x0}, 0x20) 10:53:14 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8992, &(0x7f0000000040)={'vlan0\x00', @ifru_hwaddr=@remote}) 10:53:14 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000140)={0x1f, 0xffff, 0x3}, 0x6) write(r0, &(0x7f0000000100)="0a00020001007b", 0x7) 10:53:14 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x240, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x1a8, 0x1a8, 0x1a8, 0x1a8, 0x1a8, 0x3, 0x0, {[{{@uncond, 0x0, 0xd0, 0xf0, 0x0, {}, [@common=@unspec=@connbytes={{0x38, 'connbytes\x00'}, {[], 0x3}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2a0) 10:53:14 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)={0x12, 0x22, 0x8, 0x3336}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f00000001c0), &(0x7f00000000c0)=@tcp=r0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, 0x0, &(0x7f00000001c0)=""/146}, 0x20) 10:53:14 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x240, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x1a8, 0x1a8, 0x1a8, 0x1a8, 0x1a8, 0x3, 0x0, {[{{@uncond, 0x0, 0xd0, 0xf0, 0x0, {}, [@common=@unspec=@connbytes={{0x38, 'connbytes\x00'}, {[], 0x3}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2a0) 10:53:14 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)={0x12, 0x22, 0x8, 0x3336}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f00000001c0), &(0x7f00000000c0)=@tcp=r0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, 0x0, &(0x7f00000001c0)=""/146}, 0x20) 10:53:14 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8992, &(0x7f0000000040)={'vlan0\x00', @ifru_hwaddr=@remote}) 10:53:14 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)={0x12, 0x22, 0x8, 0x3336}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f00000001c0), &(0x7f00000000c0)=@tcp=r0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, 0x0, &(0x7f00000001c0)=""/146}, 0x20) 10:53:14 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000140)={0x1f, 0xffff, 0x3}, 0x6) write(r0, &(0x7f0000000100)="0a00020001007b", 0x7) 10:53:14 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)={0x12, 0x22, 0x8, 0x3336}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f00000001c0), &(0x7f00000000c0)=@tcp=r0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, 0x0, &(0x7f00000001c0)=""/146}, 0x20) 10:53:14 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8992, &(0x7f0000000040)={'vlan0\x00', @ifru_hwaddr=@remote}) 10:53:14 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x240, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x1a8, 0x1a8, 0x1a8, 0x1a8, 0x1a8, 0x3, 0x0, {[{{@uncond, 0x0, 0xd0, 0xf0, 0x0, {}, [@common=@unspec=@connbytes={{0x38, 'connbytes\x00'}, {[], 0x3}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2a0) 10:53:14 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000140)={0x1f, 0xffff, 0x3}, 0x6) write(r0, &(0x7f0000000100)="0a00020001007b", 0x7) 10:53:14 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)={0x12, 0x22, 0x8, 0x3336}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f00000001c0), &(0x7f00000000c0)=@tcp=r0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, 0x0, &(0x7f00000001c0)=""/146}, 0x20) 10:53:14 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)={0x12, 0x22, 0x8, 0x3336}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f00000001c0), &(0x7f00000000c0)=@tcp=r0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, 0x0, &(0x7f00000001c0)=""/146}, 0x20) 10:53:14 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x240, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x1a8, 0x1a8, 0x1a8, 0x1a8, 0x1a8, 0x3, 0x0, {[{{@uncond, 0x0, 0xd0, 0xf0, 0x0, {}, [@common=@unspec=@connbytes={{0x38, 'connbytes\x00'}, {[], 0x3}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2a0) 10:53:14 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)={0x12, 0x22, 0x8, 0x3336}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f00000001c0), &(0x7f00000000c0)=@tcp=r0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, 0x0, &(0x7f00000001c0)=""/146}, 0x20) 10:53:14 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000001080)='ns/cgroup\x00') 10:53:14 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r0, &(0x7f00000002c0)=[{&(0x7f00000000c0)='7', 0x1}], 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x401c5820, &(0x7f0000000080)) 10:53:14 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=@updsa={0x180, 0x1a, 0x1, 0x0, 0x0, {{@in=@multicast1}, {@in6, 0x0, 0x6c}, @in=@local, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}, @algo_crypt={0x48, 0x2, {{'lrw(cast6)\x00'}}}]}, 0x180}}, 0x0) 10:53:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000005a80)=[{&(0x7f0000000200)={0x28, 0x10, 0x1, 0x0, 0x0, "", [@typed={0xd, 0x0, 0x0, 0x0, @binary="60bd766645315c51c9"}, @nested={0x5, 0x18, 0x0, 0x1, [@generic='*']}]}, 0x28}], 0x1}, 0x0) 10:53:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)={0x12, 0x22, 0x8, 0x3336}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f00000001c0), &(0x7f00000000c0)=@tcp=r0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, 0x0, &(0x7f00000001c0)=""/146}, 0x20) 10:53:15 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=@updsa={0x180, 0x1a, 0x1, 0x0, 0x0, {{@in=@multicast1}, {@in6, 0x0, 0x6c}, @in=@local, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}, @algo_crypt={0x48, 0x2, {{'lrw(cast6)\x00'}}}]}, 0x180}}, 0x0) 10:53:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001080)='TIPCv2\x00', 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x24, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x24}}, 0x0) 10:53:15 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c05e87c55a1bc000900b8000699030007000500154002008178a800050008000200e558110000000100000e006f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee48100000000000000d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d08fad95667e04adcdf634c1f215ce3bb53b409d5e1ca4e81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 10:53:15 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r0, &(0x7f00000002c0)=[{&(0x7f00000000c0)='7', 0x1}], 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x401c5820, &(0x7f0000000080)) 10:53:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)={0x12, 0x22, 0x8, 0x3336}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f00000001c0), &(0x7f00000000c0)=@tcp=r0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, 0x0, &(0x7f00000001c0)=""/146}, 0x20) 10:53:15 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=@updsa={0x180, 0x1a, 0x1, 0x0, 0x0, {{@in=@multicast1}, {@in6, 0x0, 0x6c}, @in=@local, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}, @algo_crypt={0x48, 0x2, {{'lrw(cast6)\x00'}}}]}, 0x180}}, 0x0) 10:53:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001080)='TIPCv2\x00', 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x24, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x24}}, 0x0) 10:53:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001080)='TIPCv2\x00', 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x24, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x24}}, 0x0) 10:53:15 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c05e87c55a1bc000900b8000699030007000500154002008178a800050008000200e558110000000100000e006f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee48100000000000000d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d08fad95667e04adcdf634c1f215ce3bb53b409d5e1ca4e81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 10:53:15 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r0, &(0x7f00000002c0)=[{&(0x7f00000000c0)='7', 0x1}], 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x401c5820, &(0x7f0000000080)) 10:53:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000005a80)=[{&(0x7f0000000200)={0x28, 0x10, 0x1, 0x0, 0x0, "", [@typed={0xd, 0x0, 0x0, 0x0, @binary="60bd766645315c51c9"}, @nested={0x5, 0x18, 0x0, 0x1, [@generic='*']}]}, 0x28}], 0x1}, 0x0) 10:53:15 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=@updsa={0x180, 0x1a, 0x1, 0x0, 0x0, {{@in=@multicast1}, {@in6, 0x0, 0x6c}, @in=@local, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}, @algo_crypt={0x48, 0x2, {{'lrw(cast6)\x00'}}}]}, 0x180}}, 0x0) 10:53:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001080)='TIPCv2\x00', 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x24, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x24}}, 0x0) 10:53:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001080)='TIPCv2\x00', 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x24, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x24}}, 0x0) 10:53:15 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r0, &(0x7f00000002c0)=[{&(0x7f00000000c0)='7', 0x1}], 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x401c5820, &(0x7f0000000080)) 10:53:15 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r0, &(0x7f00000002c0)=[{&(0x7f00000000c0)='7', 0x1}], 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x401c5820, &(0x7f0000000080)) 10:53:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001080)='TIPCv2\x00', 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x24, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x24}}, 0x0) 10:53:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001080)='TIPCv2\x00', 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x24, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x24}}, 0x0) 10:53:16 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c05e87c55a1bc000900b8000699030007000500154002008178a800050008000200e558110000000100000e006f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee48100000000000000d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d08fad95667e04adcdf634c1f215ce3bb53b409d5e1ca4e81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 10:53:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000005a80)=[{&(0x7f0000000200)={0x28, 0x10, 0x1, 0x0, 0x0, "", [@typed={0xd, 0x0, 0x0, 0x0, @binary="60bd766645315c51c9"}, @nested={0x5, 0x18, 0x0, 0x1, [@generic='*']}]}, 0x28}], 0x1}, 0x0) 10:53:16 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r0, &(0x7f00000002c0)=[{&(0x7f00000000c0)='7', 0x1}], 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x401c5820, &(0x7f0000000080)) 10:53:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r0, &(0x7f00000002c0)=[{&(0x7f00000000c0)='7', 0x1}], 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x401c5820, &(0x7f0000000080)) 10:53:16 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x67) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 10:53:16 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r0, &(0x7f00000002c0)=[{&(0x7f00000000c0)='7', 0x1}], 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x401c5820, &(0x7f0000000080)) 10:53:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r0, &(0x7f00000002c0)=[{&(0x7f00000000c0)='7', 0x1}], 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x401c5820, &(0x7f0000000080)) 10:53:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000005a80)=[{&(0x7f0000000200)={0x28, 0x10, 0x1, 0x0, 0x0, "", [@typed={0xd, 0x0, 0x0, 0x0, @binary="60bd766645315c51c9"}, @nested={0x5, 0x18, 0x0, 0x1, [@generic='*']}]}, 0x28}], 0x1}, 0x0) 10:53:16 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x67) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 10:53:16 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c05e87c55a1bc000900b8000699030007000500154002008178a800050008000200e558110000000100000e006f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee48100000000000000d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d08fad95667e04adcdf634c1f215ce3bb53b409d5e1ca4e81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 10:53:16 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r0, &(0x7f00000002c0)=[{&(0x7f00000000c0)='7', 0x1}], 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x401c5820, &(0x7f0000000080)) 10:53:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r0, &(0x7f00000002c0)=[{&(0x7f00000000c0)='7', 0x1}], 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x401c5820, &(0x7f0000000080)) 10:53:16 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x67) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 10:53:16 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r0, &(0x7f00000002c0)=[{&(0x7f00000000c0)='7', 0x1}], 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x401c5820, &(0x7f0000000080)) 10:53:17 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0x309000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) accept$ax25(r0, 0x0, &(0x7f0000002140)) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3af054182a9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f464de7188b"}, 0x60) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x1, 0x0, 0x0) getsockopt$nfc_llcp(r3, 0x118, 0x0, 0x0, 0x0) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3af054182a9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f464de7188b"}, 0x60) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, 0x0, 0x0) getsockopt$nfc_llcp(r4, 0x118, 0x1, &(0x7f0000000100)=""/149, 0x207a0cb3) 10:53:17 executing program 2: r0 = socket(0xa, 0x3, 0x2) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x1a, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) 10:53:17 executing program 3: r0 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) syz_emit_ethernet(0x52, &(0x7f0000000040)={@local, @empty, @val={@void}, {@mpls_mc={0x8100, {[], @ipv4=@tipc={{0x5, 0x4, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x6, 0x0, @private, @multicast2}, @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 10:53:17 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r0, &(0x7f00000002c0)=[{&(0x7f00000000c0)='7', 0x1}], 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x401c5820, &(0x7f0000000080)) 10:53:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x67) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 10:53:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00', 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000580)={0x60, r1, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r2}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5, 0x3, 0x9}, {0x8}}, {0x8}}}]}}]}, 0x60}}, 0x0) 10:53:17 executing program 2: r0 = socket(0xa, 0x3, 0x2) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x1a, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) 10:53:17 executing program 3: r0 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) syz_emit_ethernet(0x52, &(0x7f0000000040)={@local, @empty, @val={@void}, {@mpls_mc={0x8100, {[], @ipv4=@tipc={{0x5, 0x4, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x6, 0x0, @private, @multicast2}, @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 10:53:17 executing program 4: r0 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) syz_emit_ethernet(0x52, &(0x7f0000000040)={@local, @empty, @val={@void}, {@mpls_mc={0x8100, {[], @ipv4=@tipc={{0x5, 0x4, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x6, 0x0, @private, @multicast2}, @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 10:53:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00', 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000580)={0x60, r1, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r2}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5, 0x3, 0x9}, {0x8}}, {0x8}}}]}}]}, 0x60}}, 0x0) 10:53:17 executing program 2: r0 = socket(0xa, 0x3, 0x2) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x1a, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) 10:53:17 executing program 0: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={0x1, 0x0, 0x0, 0xefaa601c0b568a95}, 0x20) 10:53:17 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0x309000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) accept$ax25(r0, 0x0, &(0x7f0000002140)) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3af054182a9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f464de7188b"}, 0x60) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x1, 0x0, 0x0) getsockopt$nfc_llcp(r3, 0x118, 0x0, 0x0, 0x0) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3af054182a9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f464de7188b"}, 0x60) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, 0x0, 0x0) getsockopt$nfc_llcp(r4, 0x118, 0x1, &(0x7f0000000100)=""/149, 0x207a0cb3) 10:53:17 executing program 3: r0 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) syz_emit_ethernet(0x52, &(0x7f0000000040)={@local, @empty, @val={@void}, {@mpls_mc={0x8100, {[], @ipv4=@tipc={{0x5, 0x4, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x6, 0x0, @private, @multicast2}, @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 10:53:17 executing program 2: r0 = socket(0xa, 0x3, 0x2) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x1a, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) 10:53:17 executing program 0: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={0x1, 0x0, 0x0, 0xefaa601c0b568a95}, 0x20) 10:53:17 executing program 4: r0 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) syz_emit_ethernet(0x52, &(0x7f0000000040)={@local, @empty, @val={@void}, {@mpls_mc={0x8100, {[], @ipv4=@tipc={{0x5, 0x4, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x6, 0x0, @private, @multicast2}, @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 10:53:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00', 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000580)={0x60, r1, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r2}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5, 0x3, 0x9}, {0x8}}, {0x8}}}]}}]}, 0x60}}, 0x0) 10:53:18 executing program 3: r0 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) syz_emit_ethernet(0x52, &(0x7f0000000040)={@local, @empty, @val={@void}, {@mpls_mc={0x8100, {[], @ipv4=@tipc={{0x5, 0x4, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x6, 0x0, @private, @multicast2}, @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 10:53:18 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0x309000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) accept$ax25(r0, 0x0, &(0x7f0000002140)) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3af054182a9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f464de7188b"}, 0x60) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x1, 0x0, 0x0) getsockopt$nfc_llcp(r3, 0x118, 0x0, 0x0, 0x0) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3af054182a9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f464de7188b"}, 0x60) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, 0x0, 0x0) getsockopt$nfc_llcp(r4, 0x118, 0x1, &(0x7f0000000100)=""/149, 0x207a0cb3) 10:53:18 executing program 4: r0 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) syz_emit_ethernet(0x52, &(0x7f0000000040)={@local, @empty, @val={@void}, {@mpls_mc={0x8100, {[], @ipv4=@tipc={{0x5, 0x4, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x6, 0x0, @private, @multicast2}, @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 10:53:18 executing program 0: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={0x1, 0x0, 0x0, 0xefaa601c0b568a95}, 0x20) 10:53:18 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00', 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000580)={0x60, r1, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r2}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5, 0x3, 0x9}, {0x8}}, {0x8}}}]}}]}, 0x60}}, 0x0) 10:53:18 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000026001946"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000005c80)=[{{0x0, 0x7ec0, 0x0}}], 0x344, 0x10122, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f0000000200)=0x84) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000100)={r1, 0x8, 0x0, 0x7, 0x3f}, &(0x7f0000000240)=0x18) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000015c0)={0x0, @in6={{0xa, 0x4e23, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}, 0x2, 0x6, 0x8001, 0x20, 0x10, 0x0, 0x4}, 0x9c) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x2bf, 0x0, 0x32}, 0x9c) bind$inet6(r3, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r3, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000140)=0x15, 0x4) shutdown(r3, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000280)=ANY=[@ANYRESHEX=r3, @ANYRESHEX, @ANYRES32=r3, @ANYRES64, @ANYBLOB="f42a8be85c607e4cf1c6a52d3caae8653a40390b3eb21ea92103cc7bde8acebe2541409e9141019c45b0512280680e3ab665fcf78efc5d2e063e48a54fc5410f31ea887d2f"], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x28012, r5, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000001340)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000001200)={"e3a3bcad90507231922d2d8d924b1079", 0x0, r6, {0xc0000}, {0x5, 0x8}, 0x10001, [0x0, 0x800, 0x2, 0x9, 0x10000, 0xfffffffe, 0x7f, 0x5, 0x1f, 0x15fdb61b, 0xfffffffffffeffff, 0x55, 0x4, 0x2, 0x4, 0x4]}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r2, 0x5000943f, 0x0) 10:53:18 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0x309000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) accept$ax25(r0, 0x0, &(0x7f0000002140)) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3af054182a9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f464de7188b"}, 0x60) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x1, 0x0, 0x0) getsockopt$nfc_llcp(r3, 0x118, 0x0, 0x0, 0x0) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3af054182a9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f464de7188b"}, 0x60) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, 0x0, 0x0) getsockopt$nfc_llcp(r4, 0x118, 0x1, &(0x7f0000000100)=""/149, 0x207a0cb3) 10:53:18 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_sfeatures={0x28}}) 10:53:18 executing program 0: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={0x1, 0x0, 0x0, 0xefaa601c0b568a95}, 0x20) 10:53:18 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0x309000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) accept$ax25(r0, 0x0, &(0x7f0000002140)) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3af054182a9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f464de7188b"}, 0x60) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x1, 0x0, 0x0) getsockopt$nfc_llcp(r3, 0x118, 0x0, 0x0, 0x0) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3af054182a9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f464de7188b"}, 0x60) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, 0x0, 0x0) getsockopt$nfc_llcp(r4, 0x118, 0x1, &(0x7f0000000100)=""/149, 0x207a0cb3) [ 177.670080][T11808] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 177.703375][T11810] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 10:53:18 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000440)={0x0, 0xed, 0x0, 0x3}, 0xc) 10:53:18 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_sfeatures={0x28}}) 10:53:18 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40000000, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) [ 177.750351][T11810] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 177.814831][T11810] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 177.853895][T11810] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 178.000258][T11808] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 178.026518][T11810] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 10:53:19 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000440)={0x0, 0xed, 0x0, 0x3}, 0xc) 10:53:19 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_sfeatures={0x28}}) [ 178.058238][T11810] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 178.080792][ T36] audit: type=1804 audit(1615027999.065:2): pid=11814 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir684715857/syzkaller.AjADS1/46/memory.events" dev="sda1" ino=14205 res=1 errno=0 [ 178.138766][T11810] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 178.254412][ T36] audit: type=1804 audit(1615027999.115:3): pid=11817 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir684715857/syzkaller.AjADS1/46/memory.events" dev="sda1" ino=14205 res=1 errno=0 10:53:19 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0x309000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) accept$ax25(r0, 0x0, &(0x7f0000002140)) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3af054182a9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f464de7188b"}, 0x60) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x1, 0x0, 0x0) getsockopt$nfc_llcp(r3, 0x118, 0x0, 0x0, 0x0) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3af054182a9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f464de7188b"}, 0x60) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, 0x0, 0x0) getsockopt$nfc_llcp(r4, 0x118, 0x1, &(0x7f0000000100)=""/149, 0x207a0cb3) 10:53:19 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000026001946"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000005c80)=[{{0x0, 0x7ec0, 0x0}}], 0x344, 0x10122, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f0000000200)=0x84) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000100)={r1, 0x8, 0x0, 0x7, 0x3f}, &(0x7f0000000240)=0x18) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000015c0)={0x0, @in6={{0xa, 0x4e23, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}, 0x2, 0x6, 0x8001, 0x20, 0x10, 0x0, 0x4}, 0x9c) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x2bf, 0x0, 0x32}, 0x9c) bind$inet6(r3, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r3, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000140)=0x15, 0x4) shutdown(r3, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000280)=ANY=[@ANYRESHEX=r3, @ANYRESHEX, @ANYRES32=r3, @ANYRES64, @ANYBLOB="f42a8be85c607e4cf1c6a52d3caae8653a40390b3eb21ea92103cc7bde8acebe2541409e9141019c45b0512280680e3ab665fcf78efc5d2e063e48a54fc5410f31ea887d2f"], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x28012, r5, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000001340)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000001200)={"e3a3bcad90507231922d2d8d924b1079", 0x0, r6, {0xc0000}, {0x5, 0x8}, 0x10001, [0x0, 0x800, 0x2, 0x9, 0x10000, 0xfffffffe, 0x7f, 0x5, 0x1f, 0x15fdb61b, 0xfffffffffffeffff, 0x55, 0x4, 0x2, 0x4, 0x4]}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r2, 0x5000943f, 0x0) 10:53:19 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000440)={0x0, 0xed, 0x0, 0x3}, 0xc) 10:53:19 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_sfeatures={0x28}}) 10:53:19 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0x309000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) accept$ax25(r0, 0x0, &(0x7f0000002140)) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3af054182a9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f464de7188b"}, 0x60) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x1, 0x0, 0x0) getsockopt$nfc_llcp(r3, 0x118, 0x0, 0x0, 0x0) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3af054182a9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f464de7188b"}, 0x60) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, 0x0, 0x0) getsockopt$nfc_llcp(r4, 0x118, 0x1, &(0x7f0000000100)=""/149, 0x207a0cb3) [ 178.549655][T11841] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 10:53:19 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000440)={0x0, 0xed, 0x0, 0x3}, 0xc) 10:53:19 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40000000, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) 10:53:19 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40000000, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) 10:53:20 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000026001946"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000005c80)=[{{0x0, 0x7ec0, 0x0}}], 0x344, 0x10122, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f0000000200)=0x84) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000100)={r1, 0x8, 0x0, 0x7, 0x3f}, &(0x7f0000000240)=0x18) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000015c0)={0x0, @in6={{0xa, 0x4e23, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}, 0x2, 0x6, 0x8001, 0x20, 0x10, 0x0, 0x4}, 0x9c) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x2bf, 0x0, 0x32}, 0x9c) bind$inet6(r3, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r3, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000140)=0x15, 0x4) shutdown(r3, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000280)=ANY=[@ANYRESHEX=r3, @ANYRESHEX, @ANYRES32=r3, @ANYRES64, @ANYBLOB="f42a8be85c607e4cf1c6a52d3caae8653a40390b3eb21ea92103cc7bde8acebe2541409e9141019c45b0512280680e3ab665fcf78efc5d2e063e48a54fc5410f31ea887d2f"], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x28012, r5, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000001340)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000001200)={"e3a3bcad90507231922d2d8d924b1079", 0x0, r6, {0xc0000}, {0x5, 0x8}, 0x10001, [0x0, 0x800, 0x2, 0x9, 0x10000, 0xfffffffe, 0x7f, 0x5, 0x1f, 0x15fdb61b, 0xfffffffffffeffff, 0x55, 0x4, 0x2, 0x4, 0x4]}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r2, 0x5000943f, 0x0) 10:53:20 executing program 5: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000026001946"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000005c80)=[{{0x0, 0x7ec0, 0x0}}], 0x344, 0x10122, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f0000000200)=0x84) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000100)={r1, 0x8, 0x0, 0x7, 0x3f}, &(0x7f0000000240)=0x18) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000015c0)={0x0, @in6={{0xa, 0x4e23, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}, 0x2, 0x6, 0x8001, 0x20, 0x10, 0x0, 0x4}, 0x9c) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x2bf, 0x0, 0x32}, 0x9c) bind$inet6(r3, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r3, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000140)=0x15, 0x4) shutdown(r3, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000280)=ANY=[@ANYRESHEX=r3, @ANYRESHEX, @ANYRES32=r3, @ANYRES64, @ANYBLOB="f42a8be85c607e4cf1c6a52d3caae8653a40390b3eb21ea92103cc7bde8acebe2541409e9141019c45b0512280680e3ab665fcf78efc5d2e063e48a54fc5410f31ea887d2f"], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x28012, r5, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000001340)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000001200)={"e3a3bcad90507231922d2d8d924b1079", 0x0, r6, {0xc0000}, {0x5, 0x8}, 0x10001, [0x0, 0x800, 0x2, 0x9, 0x10000, 0xfffffffe, 0x7f, 0x5, 0x1f, 0x15fdb61b, 0xfffffffffffeffff, 0x55, 0x4, 0x2, 0x4, 0x4]}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r2, 0x5000943f, 0x0) 10:53:20 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000026001946"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000005c80)=[{{0x0, 0x7ec0, 0x0}}], 0x344, 0x10122, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f0000000200)=0x84) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000100)={r1, 0x8, 0x0, 0x7, 0x3f}, &(0x7f0000000240)=0x18) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000015c0)={0x0, @in6={{0xa, 0x4e23, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}, 0x2, 0x6, 0x8001, 0x20, 0x10, 0x0, 0x4}, 0x9c) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x2bf, 0x0, 0x32}, 0x9c) bind$inet6(r3, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r3, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000140)=0x15, 0x4) shutdown(r3, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000280)=ANY=[@ANYRESHEX=r3, @ANYRESHEX, @ANYRES32=r3, @ANYRES64, @ANYBLOB="f42a8be85c607e4cf1c6a52d3caae8653a40390b3eb21ea92103cc7bde8acebe2541409e9141019c45b0512280680e3ab665fcf78efc5d2e063e48a54fc5410f31ea887d2f"], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x28012, r5, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000001340)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000001200)={"e3a3bcad90507231922d2d8d924b1079", 0x0, r6, {0xc0000}, {0x5, 0x8}, 0x10001, [0x0, 0x800, 0x2, 0x9, 0x10000, 0xfffffffe, 0x7f, 0x5, 0x1f, 0x15fdb61b, 0xfffffffffffeffff, 0x55, 0x4, 0x2, 0x4, 0x4]}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r2, 0x5000943f, 0x0) 10:53:20 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000026001946"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000005c80)=[{{0x0, 0x7ec0, 0x0}}], 0x344, 0x10122, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f0000000200)=0x84) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000100)={r1, 0x8, 0x0, 0x7, 0x3f}, &(0x7f0000000240)=0x18) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000015c0)={0x0, @in6={{0xa, 0x4e23, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}, 0x2, 0x6, 0x8001, 0x20, 0x10, 0x0, 0x4}, 0x9c) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x2bf, 0x0, 0x32}, 0x9c) bind$inet6(r3, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r3, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000140)=0x15, 0x4) shutdown(r3, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000280)=ANY=[@ANYRESHEX=r3, @ANYRESHEX, @ANYRES32=r3, @ANYRES64, @ANYBLOB="f42a8be85c607e4cf1c6a52d3caae8653a40390b3eb21ea92103cc7bde8acebe2541409e9141019c45b0512280680e3ab665fcf78efc5d2e063e48a54fc5410f31ea887d2f"], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x28012, r5, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000001340)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000001200)={"e3a3bcad90507231922d2d8d924b1079", 0x0, r6, {0xc0000}, {0x5, 0x8}, 0x10001, [0x0, 0x800, 0x2, 0x9, 0x10000, 0xfffffffe, 0x7f, 0x5, 0x1f, 0x15fdb61b, 0xfffffffffffeffff, 0x55, 0x4, 0x2, 0x4, 0x4]}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r2, 0x5000943f, 0x0) 10:53:20 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40000000, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) 10:53:21 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40000000, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) 10:53:21 executing program 5: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000026001946"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000005c80)=[{{0x0, 0x7ec0, 0x0}}], 0x344, 0x10122, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f0000000200)=0x84) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000100)={r1, 0x8, 0x0, 0x7, 0x3f}, &(0x7f0000000240)=0x18) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000015c0)={0x0, @in6={{0xa, 0x4e23, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}, 0x2, 0x6, 0x8001, 0x20, 0x10, 0x0, 0x4}, 0x9c) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x2bf, 0x0, 0x32}, 0x9c) bind$inet6(r3, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r3, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000140)=0x15, 0x4) shutdown(r3, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000280)=ANY=[@ANYRESHEX=r3, @ANYRESHEX, @ANYRES32=r3, @ANYRES64, @ANYBLOB="f42a8be85c607e4cf1c6a52d3caae8653a40390b3eb21ea92103cc7bde8acebe2541409e9141019c45b0512280680e3ab665fcf78efc5d2e063e48a54fc5410f31ea887d2f"], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x28012, r5, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000001340)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000001200)={"e3a3bcad90507231922d2d8d924b1079", 0x0, r6, {0xc0000}, {0x5, 0x8}, 0x10001, [0x0, 0x800, 0x2, 0x9, 0x10000, 0xfffffffe, 0x7f, 0x5, 0x1f, 0x15fdb61b, 0xfffffffffffeffff, 0x55, 0x4, 0x2, 0x4, 0x4]}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r2, 0x5000943f, 0x0) 10:53:21 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000026001946"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000005c80)=[{{0x0, 0x7ec0, 0x0}}], 0x344, 0x10122, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f0000000200)=0x84) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000100)={r1, 0x8, 0x0, 0x7, 0x3f}, &(0x7f0000000240)=0x18) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000015c0)={0x0, @in6={{0xa, 0x4e23, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}, 0x2, 0x6, 0x8001, 0x20, 0x10, 0x0, 0x4}, 0x9c) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x2bf, 0x0, 0x32}, 0x9c) bind$inet6(r3, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r3, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000140)=0x15, 0x4) shutdown(r3, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000280)=ANY=[@ANYRESHEX=r3, @ANYRESHEX, @ANYRES32=r3, @ANYRES64, @ANYBLOB="f42a8be85c607e4cf1c6a52d3caae8653a40390b3eb21ea92103cc7bde8acebe2541409e9141019c45b0512280680e3ab665fcf78efc5d2e063e48a54fc5410f31ea887d2f"], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x28012, r5, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000001340)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000001200)={"e3a3bcad90507231922d2d8d924b1079", 0x0, r6, {0xc0000}, {0x5, 0x8}, 0x10001, [0x0, 0x800, 0x2, 0x9, 0x10000, 0xfffffffe, 0x7f, 0x5, 0x1f, 0x15fdb61b, 0xfffffffffffeffff, 0x55, 0x4, 0x2, 0x4, 0x4]}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r2, 0x5000943f, 0x0) 10:53:21 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000026001946"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000005c80)=[{{0x0, 0x7ec0, 0x0}}], 0x344, 0x10122, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f0000000200)=0x84) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000100)={r1, 0x8, 0x0, 0x7, 0x3f}, &(0x7f0000000240)=0x18) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000015c0)={0x0, @in6={{0xa, 0x4e23, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}, 0x2, 0x6, 0x8001, 0x20, 0x10, 0x0, 0x4}, 0x9c) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x2bf, 0x0, 0x32}, 0x9c) bind$inet6(r3, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r3, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000140)=0x15, 0x4) shutdown(r3, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000280)=ANY=[@ANYRESHEX=r3, @ANYRESHEX, @ANYRES32=r3, @ANYRES64, @ANYBLOB="f42a8be85c607e4cf1c6a52d3caae8653a40390b3eb21ea92103cc7bde8acebe2541409e9141019c45b0512280680e3ab665fcf78efc5d2e063e48a54fc5410f31ea887d2f"], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x28012, r5, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000001340)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000001200)={"e3a3bcad90507231922d2d8d924b1079", 0x0, r6, {0xc0000}, {0x5, 0x8}, 0x10001, [0x0, 0x800, 0x2, 0x9, 0x10000, 0xfffffffe, 0x7f, 0x5, 0x1f, 0x15fdb61b, 0xfffffffffffeffff, 0x55, 0x4, 0x2, 0x4, 0x4]}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r2, 0x5000943f, 0x0) 10:53:21 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000026001946"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000005c80)=[{{0x0, 0x7ec0, 0x0}}], 0x344, 0x10122, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f0000000200)=0x84) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000100)={r1, 0x8, 0x0, 0x7, 0x3f}, &(0x7f0000000240)=0x18) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000015c0)={0x0, @in6={{0xa, 0x4e23, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}, 0x2, 0x6, 0x8001, 0x20, 0x10, 0x0, 0x4}, 0x9c) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x2bf, 0x0, 0x32}, 0x9c) bind$inet6(r3, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r3, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000140)=0x15, 0x4) shutdown(r3, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000280)=ANY=[@ANYRESHEX=r3, @ANYRESHEX, @ANYRES32=r3, @ANYRES64, @ANYBLOB="f42a8be85c607e4cf1c6a52d3caae8653a40390b3eb21ea92103cc7bde8acebe2541409e9141019c45b0512280680e3ab665fcf78efc5d2e063e48a54fc5410f31ea887d2f"], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x28012, r5, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000001340)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000001200)={"e3a3bcad90507231922d2d8d924b1079", 0x0, r6, {0xc0000}, {0x5, 0x8}, 0x10001, [0x0, 0x800, 0x2, 0x9, 0x10000, 0xfffffffe, 0x7f, 0x5, 0x1f, 0x15fdb61b, 0xfffffffffffeffff, 0x55, 0x4, 0x2, 0x4, 0x4]}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r2, 0x5000943f, 0x0) 10:53:22 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40000000, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) 10:53:22 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40000000, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) 10:53:22 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000026001946"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000005c80)=[{{0x0, 0x7ec0, 0x0}}], 0x344, 0x10122, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f0000000200)=0x84) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000100)={r1, 0x8, 0x0, 0x7, 0x3f}, &(0x7f0000000240)=0x18) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000015c0)={0x0, @in6={{0xa, 0x4e23, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}, 0x2, 0x6, 0x8001, 0x20, 0x10, 0x0, 0x4}, 0x9c) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x2bf, 0x0, 0x32}, 0x9c) bind$inet6(r3, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r3, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000140)=0x15, 0x4) shutdown(r3, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000280)=ANY=[@ANYRESHEX=r3, @ANYRESHEX, @ANYRES32=r3, @ANYRES64, @ANYBLOB="f42a8be85c607e4cf1c6a52d3caae8653a40390b3eb21ea92103cc7bde8acebe2541409e9141019c45b0512280680e3ab665fcf78efc5d2e063e48a54fc5410f31ea887d2f"], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x28012, r5, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000001340)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000001200)={"e3a3bcad90507231922d2d8d924b1079", 0x0, r6, {0xc0000}, {0x5, 0x8}, 0x10001, [0x0, 0x800, 0x2, 0x9, 0x10000, 0xfffffffe, 0x7f, 0x5, 0x1f, 0x15fdb61b, 0xfffffffffffeffff, 0x55, 0x4, 0x2, 0x4, 0x4]}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r2, 0x5000943f, 0x0) 10:53:22 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000026001946"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000005c80)=[{{0x0, 0x7ec0, 0x0}}], 0x344, 0x10122, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f0000000200)=0x84) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000100)={r1, 0x8, 0x0, 0x7, 0x3f}, &(0x7f0000000240)=0x18) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000015c0)={0x0, @in6={{0xa, 0x4e23, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}, 0x2, 0x6, 0x8001, 0x20, 0x10, 0x0, 0x4}, 0x9c) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x2bf, 0x0, 0x32}, 0x9c) bind$inet6(r3, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r3, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000140)=0x15, 0x4) shutdown(r3, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000280)=ANY=[@ANYRESHEX=r3, @ANYRESHEX, @ANYRES32=r3, @ANYRES64, @ANYBLOB="f42a8be85c607e4cf1c6a52d3caae8653a40390b3eb21ea92103cc7bde8acebe2541409e9141019c45b0512280680e3ab665fcf78efc5d2e063e48a54fc5410f31ea887d2f"], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x28012, r5, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000001340)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000001200)={"e3a3bcad90507231922d2d8d924b1079", 0x0, r6, {0xc0000}, {0x5, 0x8}, 0x10001, [0x0, 0x800, 0x2, 0x9, 0x10000, 0xfffffffe, 0x7f, 0x5, 0x1f, 0x15fdb61b, 0xfffffffffffeffff, 0x55, 0x4, 0x2, 0x4, 0x4]}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r2, 0x5000943f, 0x0) 10:53:22 executing program 5: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000026001946"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000005c80)=[{{0x0, 0x7ec0, 0x0}}], 0x344, 0x10122, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00'}}}, &(0x7f0000000200)=0x84) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000100)={r1, 0x8, 0x0, 0x7, 0x3f}, &(0x7f0000000240)=0x18) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000015c0)={0x0, @in6={{0xa, 0x4e23, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}, 0x2, 0x6, 0x8001, 0x20, 0x10, 0x0, 0x4}, 0x9c) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x2bf, 0x0, 0x32}, 0x9c) bind$inet6(r3, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r3, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000140)=0x15, 0x4) shutdown(r3, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000280)=ANY=[@ANYRESHEX=r3, @ANYRESHEX, @ANYRES32=r3, @ANYRES64, @ANYBLOB="f42a8be85c607e4cf1c6a52d3caae8653a40390b3eb21ea92103cc7bde8acebe2541409e9141019c45b0512280680e3ab665fcf78efc5d2e063e48a54fc5410f31ea887d2f"], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x28012, r5, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000001340)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000001200)={"e3a3bcad90507231922d2d8d924b1079", 0x0, r6, {0xc0000}, {0x5, 0x8}, 0x10001, [0x0, 0x800, 0x2, 0x9, 0x10000, 0xfffffffe, 0x7f, 0x5, 0x1f, 0x15fdb61b, 0xfffffffffffeffff, 0x55, 0x4, 0x2, 0x4, 0x4]}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r2, 0x5000943f, 0x0) 10:53:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="240000000101010200000000000000000a0000000c00198008000200f30f0000040002"], 0x24}}, 0x0) 10:53:22 executing program 4: socket$nl_route(0x10, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0xfffd}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000500) 10:53:23 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x8000000000000000) [ 182.269127][ T36] audit: type=1804 audit(1615028003.256:4): pid=11932 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir412964622/syzkaller.9gJyt9/34/cgroup.controllers" dev="sda1" ino=14213 res=1 errno=0 10:53:23 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x8000000000000000) 10:53:23 executing program 4: socket$nl_route(0x10, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0xfffd}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000500) [ 182.489319][ T36] audit: type=1804 audit(1615028003.386:5): pid=11932 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir412964622/syzkaller.9gJyt9/34/cgroup.controllers" dev="sda1" ino=14213 res=1 errno=0 10:53:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="240000000101010200000000000000000a0000000c00198008000200f30f0000040002"], 0x24}}, 0x0) 10:53:23 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x8000000000000000) [ 182.884077][ T36] audit: type=1804 audit(1615028003.876:6): pid=11938 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir412964622/syzkaller.9gJyt9/35/cgroup.controllers" dev="sda1" ino=14217 res=1 errno=0 10:53:24 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0xfffd}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000500) 10:53:24 executing program 5: bpf$PROG_LOAD(0x8, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @llc={0x1a, 0x206, 0x1, 0x6, 0x4, 0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @nl=@kern={0x10, 0x0, 0x0, 0x40000000}, @nl=@unspec, 0x6, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)='macsec0\x00', 0x3ff, 0x5}) socket$bt_cmtp(0x1f, 0x3, 0x5) pipe(&(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.net/syz1\x00', 0x1ff) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x80, 0x10, 0x2, 0x7594, {{0x1e, 0x4, 0x0, 0x22, 0x78, 0x64, 0x0, 0x3, 0x4, 0x0, @loopback, @loopback, {[@cipso={0x86, 0x47, 0x0, [{0x0, 0x4, "16f0"}, {0x1, 0x7, "3a65d7bc56"}, {0x2, 0x7, "629f50016f"}, {0x1, 0x3, 'a'}, {0x5, 0xb, "0bd54ec89592188886"}, {0x7, 0x12, "7503eb0a3d13f9474b2b24e7535cef1f"}, {0x7, 0x7, "75a631c62f"}, {0x0, 0x8, "08433172e9e4"}]}, @cipso={0x86, 0x1d, 0x0, [{0x7, 0xb, "583e31a596fa6538ae"}, {0x1, 0xc, "bcb8c732da5863528a22"}]}]}}}}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x1ff) pipe(&(0x7f00000015c0)={0xffffffffffffffff}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x48, 0x0, 0x200, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1ff}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000340)={r1}, 0x8) 10:53:24 executing program 2: unshare(0x400) r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r1, 0x101, 0x0, 0x0, 0x0) setsockopt$ax25_int(r0, 0x101, 0x1, &(0x7f0000000000)=0x6, 0x4) 10:53:24 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x8000000000000000) [ 183.239897][ T36] audit: type=1804 audit(1615028004.226:7): pid=11951 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir028319139/syzkaller.MJsDjF/45/cgroup.controllers" dev="sda1" ino=14214 res=1 errno=0 10:53:24 executing program 5: bpf$PROG_LOAD(0x8, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @llc={0x1a, 0x206, 0x1, 0x6, 0x4, 0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @nl=@kern={0x10, 0x0, 0x0, 0x40000000}, @nl=@unspec, 0x6, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)='macsec0\x00', 0x3ff, 0x5}) socket$bt_cmtp(0x1f, 0x3, 0x5) pipe(&(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.net/syz1\x00', 0x1ff) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x80, 0x10, 0x2, 0x7594, {{0x1e, 0x4, 0x0, 0x22, 0x78, 0x64, 0x0, 0x3, 0x4, 0x0, @loopback, @loopback, {[@cipso={0x86, 0x47, 0x0, [{0x0, 0x4, "16f0"}, {0x1, 0x7, "3a65d7bc56"}, {0x2, 0x7, "629f50016f"}, {0x1, 0x3, 'a'}, {0x5, 0xb, "0bd54ec89592188886"}, {0x7, 0x12, "7503eb0a3d13f9474b2b24e7535cef1f"}, {0x7, 0x7, "75a631c62f"}, {0x0, 0x8, "08433172e9e4"}]}, @cipso={0x86, 0x1d, 0x0, [{0x7, 0xb, "583e31a596fa6538ae"}, {0x1, 0xc, "bcb8c732da5863528a22"}]}]}}}}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x1ff) pipe(&(0x7f00000015c0)={0xffffffffffffffff}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x48, 0x0, 0x200, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1ff}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000340)={r1}, 0x8) 10:53:24 executing program 2: unshare(0x400) r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r1, 0x101, 0x0, 0x0, 0x0) setsockopt$ax25_int(r0, 0x101, 0x1, &(0x7f0000000000)=0x6, 0x4) 10:53:24 executing program 0: unshare(0x400) r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r1, 0x101, 0x0, 0x0, 0x0) setsockopt$ax25_int(r0, 0x101, 0x1, &(0x7f0000000000)=0x6, 0x4) 10:53:24 executing program 4: socket$nl_route(0x10, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0xfffd}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000500) 10:53:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="240000000101010200000000000000000a0000000c00198008000200f30f0000040002"], 0x24}}, 0x0) 10:53:24 executing program 5: bpf$PROG_LOAD(0x8, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @llc={0x1a, 0x206, 0x1, 0x6, 0x4, 0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @nl=@kern={0x10, 0x0, 0x0, 0x40000000}, @nl=@unspec, 0x6, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)='macsec0\x00', 0x3ff, 0x5}) socket$bt_cmtp(0x1f, 0x3, 0x5) pipe(&(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.net/syz1\x00', 0x1ff) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x80, 0x10, 0x2, 0x7594, {{0x1e, 0x4, 0x0, 0x22, 0x78, 0x64, 0x0, 0x3, 0x4, 0x0, @loopback, @loopback, {[@cipso={0x86, 0x47, 0x0, [{0x0, 0x4, "16f0"}, {0x1, 0x7, "3a65d7bc56"}, {0x2, 0x7, "629f50016f"}, {0x1, 0x3, 'a'}, {0x5, 0xb, "0bd54ec89592188886"}, {0x7, 0x12, "7503eb0a3d13f9474b2b24e7535cef1f"}, {0x7, 0x7, "75a631c62f"}, {0x0, 0x8, "08433172e9e4"}]}, @cipso={0x86, 0x1d, 0x0, [{0x7, 0xb, "583e31a596fa6538ae"}, {0x1, 0xc, "bcb8c732da5863528a22"}]}]}}}}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x1ff) pipe(&(0x7f00000015c0)={0xffffffffffffffff}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x48, 0x0, 0x200, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1ff}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000340)={r1}, 0x8) 10:53:24 executing program 0: unshare(0x400) r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r1, 0x101, 0x0, 0x0, 0x0) setsockopt$ax25_int(r0, 0x101, 0x1, &(0x7f0000000000)=0x6, 0x4) 10:53:24 executing program 2: unshare(0x400) r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r1, 0x101, 0x0, 0x0, 0x0) setsockopt$ax25_int(r0, 0x101, 0x1, &(0x7f0000000000)=0x6, 0x4) 10:53:24 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0xfffd}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000500) 10:53:24 executing program 0: unshare(0x400) r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r1, 0x101, 0x0, 0x0, 0x0) setsockopt$ax25_int(r0, 0x101, 0x1, &(0x7f0000000000)=0x6, 0x4) 10:53:24 executing program 5: bpf$PROG_LOAD(0x8, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @llc={0x1a, 0x206, 0x1, 0x6, 0x4, 0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @nl=@kern={0x10, 0x0, 0x0, 0x40000000}, @nl=@unspec, 0x6, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)='macsec0\x00', 0x3ff, 0x5}) socket$bt_cmtp(0x1f, 0x3, 0x5) pipe(&(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.net/syz1\x00', 0x1ff) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x80, 0x10, 0x2, 0x7594, {{0x1e, 0x4, 0x0, 0x22, 0x78, 0x64, 0x0, 0x3, 0x4, 0x0, @loopback, @loopback, {[@cipso={0x86, 0x47, 0x0, [{0x0, 0x4, "16f0"}, {0x1, 0x7, "3a65d7bc56"}, {0x2, 0x7, "629f50016f"}, {0x1, 0x3, 'a'}, {0x5, 0xb, "0bd54ec89592188886"}, {0x7, 0x12, "7503eb0a3d13f9474b2b24e7535cef1f"}, {0x7, 0x7, "75a631c62f"}, {0x0, 0x8, "08433172e9e4"}]}, @cipso={0x86, 0x1d, 0x0, [{0x7, 0xb, "583e31a596fa6538ae"}, {0x1, 0xc, "bcb8c732da5863528a22"}]}]}}}}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x1ff) pipe(&(0x7f00000015c0)={0xffffffffffffffff}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x48, 0x0, 0x200, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1ff}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000340)={r1}, 0x8) 10:53:25 executing program 2: unshare(0x400) r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r1, 0x101, 0x0, 0x0, 0x0) setsockopt$ax25_int(r0, 0x101, 0x1, &(0x7f0000000000)=0x6, 0x4) [ 184.050327][ T36] audit: type=1804 audit(1615028005.036:8): pid=11968 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir412964622/syzkaller.9gJyt9/36/cgroup.controllers" dev="sda1" ino=14216 res=1 errno=0 10:53:25 executing program 2: bpf$PROG_LOAD(0x8, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @llc={0x1a, 0x206, 0x1, 0x6, 0x4, 0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @nl=@kern={0x10, 0x0, 0x0, 0x40000000}, @nl=@unspec, 0x6, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)='macsec0\x00', 0x3ff, 0x5}) socket$bt_cmtp(0x1f, 0x3, 0x5) pipe(&(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.net/syz1\x00', 0x1ff) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x80, 0x10, 0x2, 0x7594, {{0x1e, 0x4, 0x0, 0x22, 0x78, 0x64, 0x0, 0x3, 0x4, 0x0, @loopback, @loopback, {[@cipso={0x86, 0x47, 0x0, [{0x0, 0x4, "16f0"}, {0x1, 0x7, "3a65d7bc56"}, {0x2, 0x7, "629f50016f"}, {0x1, 0x3, 'a'}, {0x5, 0xb, "0bd54ec89592188886"}, {0x7, 0x12, "7503eb0a3d13f9474b2b24e7535cef1f"}, {0x7, 0x7, "75a631c62f"}, {0x0, 0x8, "08433172e9e4"}]}, @cipso={0x86, 0x1d, 0x0, [{0x7, 0xb, "583e31a596fa6538ae"}, {0x1, 0xc, "bcb8c732da5863528a22"}]}]}}}}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x1ff) pipe(&(0x7f00000015c0)={0xffffffffffffffff}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x48, 0x0, 0x200, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1ff}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000340)={r1}, 0x8) 10:53:25 executing program 5: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=@newqdisc={0x14c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x11c, 0x2, [@TCA_CHOKE_STAB={0x104, 0x2, "dbb82017e0331490134e191b423b7184dfa186128bd67b6cb63e0ba921cc1216e30293437bcb943b8da89e7126f7131023ebdf430b8b0a4ce37cf8adc0b4342e006390764138c92fb01a7498b9002cfd897b5cff28da74b0af6226869c5461c898a3b01ffd7e2f2ac6d5c94463f8d18361bb08ea2222cd6bd8636043ffeec2838c7f3e1222fa826c87968023723bf717c02baa6e5d5ab22dd629ef4bb0386a9811568f9d6c6e4514f5d2cb6a37886425f035390ab295d0633bc86d36c7548837a3a9400e2594c41483e26f768b9edf223b49ff860278b28853d4ceae8da604068bd21fdb94321bfa773a0e6d0d6b7d59bfaf911ad8427a5882d33a41c1a5c987"}, @TCA_CHOKE_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0xfc}}]}}]}, 0x14c}}, 0x0) 10:53:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="240000000101010200000000000000000a0000000c00198008000200f30f0000040002"], 0x24}}, 0x0) [ 184.373045][ T36] audit: type=1804 audit(1615028005.366:9): pid=11983 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir028319139/syzkaller.MJsDjF/46/cgroup.controllers" dev="sda1" ino=14219 res=1 errno=0 10:53:25 executing program 2: bpf$PROG_LOAD(0x8, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @llc={0x1a, 0x206, 0x1, 0x6, 0x4, 0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @nl=@kern={0x10, 0x0, 0x0, 0x40000000}, @nl=@unspec, 0x6, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)='macsec0\x00', 0x3ff, 0x5}) socket$bt_cmtp(0x1f, 0x3, 0x5) pipe(&(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.net/syz1\x00', 0x1ff) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x80, 0x10, 0x2, 0x7594, {{0x1e, 0x4, 0x0, 0x22, 0x78, 0x64, 0x0, 0x3, 0x4, 0x0, @loopback, @loopback, {[@cipso={0x86, 0x47, 0x0, [{0x0, 0x4, "16f0"}, {0x1, 0x7, "3a65d7bc56"}, {0x2, 0x7, "629f50016f"}, {0x1, 0x3, 'a'}, {0x5, 0xb, "0bd54ec89592188886"}, {0x7, 0x12, "7503eb0a3d13f9474b2b24e7535cef1f"}, {0x7, 0x7, "75a631c62f"}, {0x0, 0x8, "08433172e9e4"}]}, @cipso={0x86, 0x1d, 0x0, [{0x7, 0xb, "583e31a596fa6538ae"}, {0x1, 0xc, "bcb8c732da5863528a22"}]}]}}}}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x1ff) pipe(&(0x7f00000015c0)={0xffffffffffffffff}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x48, 0x0, 0x200, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1ff}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000340)={r1}, 0x8) 10:53:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=@newnexthop={0x20, 0x68, 0x582993f2ae3e69bf, 0x0, 0x0, {}, [@NHA_ID={0x8, 0x2}]}, 0x20}}, 0x0) 10:53:25 executing program 5: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=@newqdisc={0x14c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x11c, 0x2, [@TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0xfc}}]}}]}, 0x14c}}, 0x0) 10:53:25 executing program 4: socket$nl_route(0x10, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0xfffd}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000500) 10:53:25 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) socket(0x2000000000000021, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0xfffd}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000500) 10:53:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=@newnexthop={0x20, 0x68, 0x582993f2ae3e69bf, 0x0, 0x0, {}, [@NHA_ID={0x8, 0x2}]}, 0x20}}, 0x0) 10:53:25 executing program 2: bpf$PROG_LOAD(0x8, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @llc={0x1a, 0x206, 0x1, 0x6, 0x4, 0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @nl=@kern={0x10, 0x0, 0x0, 0x40000000}, @nl=@unspec, 0x6, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)='macsec0\x00', 0x3ff, 0x5}) socket$bt_cmtp(0x1f, 0x3, 0x5) pipe(&(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.net/syz1\x00', 0x1ff) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x80, 0x10, 0x2, 0x7594, {{0x1e, 0x4, 0x0, 0x22, 0x78, 0x64, 0x0, 0x3, 0x4, 0x0, @loopback, @loopback, {[@cipso={0x86, 0x47, 0x0, [{0x0, 0x4, "16f0"}, {0x1, 0x7, "3a65d7bc56"}, {0x2, 0x7, "629f50016f"}, {0x1, 0x3, 'a'}, {0x5, 0xb, "0bd54ec89592188886"}, {0x7, 0x12, "7503eb0a3d13f9474b2b24e7535cef1f"}, {0x7, 0x7, "75a631c62f"}, {0x0, 0x8, "08433172e9e4"}]}, @cipso={0x86, 0x1d, 0x0, [{0x7, 0xb, "583e31a596fa6538ae"}, {0x1, 0xc, "bcb8c732da5863528a22"}]}]}}}}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x1ff) pipe(&(0x7f00000015c0)={0xffffffffffffffff}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x48, 0x0, 0x200, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1ff}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000340)={r1}, 0x8) 10:53:25 executing program 5: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=@newqdisc={0x14c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x11c, 0x2, [@TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0xfc}}]}}]}, 0x14c}}, 0x0) 10:53:26 executing program 3: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=@newqdisc={0x14c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x11c, 0x2, [@TCA_CHOKE_STAB={0x104, 0x2, "dbb82017e0331490134e191b423b7184dfa186128bd67b6cb63e0ba921cc1216e30293437bcb943b8da89e7126f7131023ebdf430b8b0a4ce37cf8adc0b4342e006390764138c92fb01a7498b9002cfd897b5cff28da74b0af6226869c5461c898a3b01ffd7e2f2ac6d5c94463f8d18361bb08ea2222cd6bd8636043ffeec2838c7f3e1222fa826c87968023723bf717c02baa6e5d5ab22dd629ef4bb0386a9811568f9d6c6e4514f5d2cb6a37886425f035390ab295d0633bc86d36c7548837a3a9400e2594c41483e26f768b9edf223b49ff860278b28853d4ceae8da604068bd21fdb94321bfa773a0e6d0d6b7d59bfaf911ad8427a5882d33a41c1a5c987"}, @TCA_CHOKE_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0xfc}}]}}]}, 0x14c}}, 0x0) [ 185.035236][ T36] audit: type=1804 audit(1615028006.026:10): pid=12002 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir028319139/syzkaller.MJsDjF/47/cgroup.controllers" dev="sda1" ino=14217 res=1 errno=0 10:53:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=@newnexthop={0x20, 0x68, 0x582993f2ae3e69bf, 0x0, 0x0, {}, [@NHA_ID={0x8, 0x2}]}, 0x20}}, 0x0) 10:53:26 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x2, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r3, 0x84, 0x23, &(0x7f00000017c0), 0x8) ioctl$sock_SIOCDELRT(r3, 0x890c, &(0x7f0000000040)={0x0, @in={0x2, 0x4e23, @local}, @phonet={0x23, 0x9, 0x3, 0x6}, @rc={0x1f, @none, 0x8}, 0x6, 0x0, 0x0, 0x0, 0x750, &(0x7f0000000000)='wg1\x00', 0x2, 0x0, 0x3}) ppoll(&(0x7f0000002000)=[{r1, 0x2103, 0x64}], 0x1, &(0x7f0000000580)={0x0, r2+10000000}, 0x0, 0x0) 10:53:26 executing program 5: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=@newqdisc={0x14c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x11c, 0x2, [@TCA_CHOKE_STAB={0x104, 0x2, "dbb82017e0331490134e191b423b7184dfa186128bd67b6cb63e0ba921cc1216e30293437bcb943b8da89e7126f7131023ebdf430b8b0a4ce37cf8adc0b4342e006390764138c92fb01a7498b9002cfd897b5cff28da74b0af6226869c5461c898a3b01ffd7e2f2ac6d5c94463f8d18361bb08ea2222cd6bd8636043ffeec2838c7f3e1222fa826c87968023723bf717c02baa6e5d5ab22dd629ef4bb0386a9811568f9d6c6e4514f5d2cb6a37886425f035390ab295d0633bc86d36c7548837a3a9400e2594c41483e26f768b9edf223b49ff860278b28853d4ceae8da604068bd21fdb94321bfa773a0e6d0d6b7d59bfaf911ad8427a5882d33a41c1a5c987"}, @TCA_CHOKE_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0xfc}}]}}]}, 0x14c}}, 0x0) 10:53:26 executing program 3: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=@newqdisc={0x14c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x11c, 0x2, [@TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0xfc}}]}}]}, 0x14c}}, 0x0) [ 185.216580][ T36] audit: type=1804 audit(1615028006.206:11): pid=12006 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir412964622/syzkaller.9gJyt9/37/cgroup.controllers" dev="sda1" ino=14202 res=1 errno=0 10:53:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=@newnexthop={0x20, 0x68, 0x582993f2ae3e69bf, 0x0, 0x0, {}, [@NHA_ID={0x8, 0x2}]}, 0x20}}, 0x0) 10:53:26 executing program 3: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=@newqdisc={0x14c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x11c, 0x2, [@TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0xfc}}]}}]}, 0x14c}}, 0x0) 10:53:26 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x7f, 0x3, 0x5, 0x1}, 0x40) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000ed1000)={0xc, 0x4, 0x81000000004, 0x9, 0x0, r0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000002ac0)={0x7, 0x5, &(0x7f0000001440)=@framed={{0x18, 0x5}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000001480)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000014c0)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:53:26 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f00000000c0)={{0x0}, 0x0}, 0x20) 10:53:26 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 10:53:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x9, 0x8d013, r0, 0x0) 10:53:26 executing program 4: mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x40030, 0xffffffffffffffff, 0x0) 10:53:27 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x7f, 0x3, 0x5, 0x1}, 0x40) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000ed1000)={0xc, 0x4, 0x81000000004, 0x9, 0x0, r0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000002ac0)={0x7, 0x5, &(0x7f0000001440)=@framed={{0x18, 0x5}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000001480)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000014c0)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:53:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f0000000000)=0x1ff, 0x4) getsockopt$inet6_tcp_int(r0, 0x6, 0x4, 0x0, &(0x7f0000000180)) 10:53:28 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x2, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r3, 0x84, 0x23, &(0x7f00000017c0), 0x8) ioctl$sock_SIOCDELRT(r3, 0x890c, &(0x7f0000000040)={0x0, @in={0x2, 0x4e23, @local}, @phonet={0x23, 0x9, 0x3, 0x6}, @rc={0x1f, @none, 0x8}, 0x6, 0x0, 0x0, 0x0, 0x750, &(0x7f0000000000)='wg1\x00', 0x2, 0x0, 0x3}) ppoll(&(0x7f0000002000)=[{r1, 0x2103, 0x64}], 0x1, &(0x7f0000000580)={0x0, r2+10000000}, 0x0, 0x0) 10:53:28 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f00000000c0)={{0x0}, 0x0}, 0x20) 10:53:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x9, 0x8d013, r0, 0x0) 10:53:28 executing program 4: socketpair(0x27, 0x0, 0x0, 0x0) 10:53:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f0000000000)=0x1ff, 0x4) getsockopt$inet6_tcp_int(r0, 0x6, 0x4, 0x0, &(0x7f0000000180)) 10:53:28 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x7f, 0x3, 0x5, 0x1}, 0x40) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000ed1000)={0xc, 0x4, 0x81000000004, 0x9, 0x0, r0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000002ac0)={0x7, 0x5, &(0x7f0000001440)=@framed={{0x18, 0x5}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000001480)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000014c0)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:53:28 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x2, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r3, 0x84, 0x23, &(0x7f00000017c0), 0x8) ioctl$sock_SIOCDELRT(r3, 0x890c, &(0x7f0000000040)={0x0, @in={0x2, 0x4e23, @local}, @phonet={0x23, 0x9, 0x3, 0x6}, @rc={0x1f, @none, 0x8}, 0x6, 0x0, 0x0, 0x0, 0x750, &(0x7f0000000000)='wg1\x00', 0x2, 0x0, 0x3}) ppoll(&(0x7f0000002000)=[{r1, 0x2103, 0x64}], 0x1, &(0x7f0000000580)={0x0, r2+10000000}, 0x0, 0x0) 10:53:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x9, 0x8d013, r0, 0x0) 10:53:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f0000000000)=0x1ff, 0x4) getsockopt$inet6_tcp_int(r0, 0x6, 0x4, 0x0, &(0x7f0000000180)) 10:53:28 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f00000000c0)={{0x0}, 0x0}, 0x20) 10:53:28 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x7f, 0x3, 0x5, 0x1}, 0x40) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000ed1000)={0xc, 0x4, 0x81000000004, 0x9, 0x0, r0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000002ac0)={0x7, 0x5, &(0x7f0000001440)=@framed={{0x18, 0x5}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000001480)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000014c0)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:53:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f0000000000)=0x1ff, 0x4) getsockopt$inet6_tcp_int(r0, 0x6, 0x4, 0x0, &(0x7f0000000180)) 10:53:30 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x2, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r3, 0x84, 0x23, &(0x7f00000017c0), 0x8) ioctl$sock_SIOCDELRT(r3, 0x890c, &(0x7f0000000040)={0x0, @in={0x2, 0x4e23, @local}, @phonet={0x23, 0x9, 0x3, 0x6}, @rc={0x1f, @none, 0x8}, 0x6, 0x0, 0x0, 0x0, 0x750, &(0x7f0000000000)='wg1\x00', 0x2, 0x0, 0x3}) ppoll(&(0x7f0000002000)=[{r1, 0x2103, 0x64}], 0x1, &(0x7f0000000580)={0x0, r2+10000000}, 0x0, 0x0) 10:53:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x9, 0x8d013, r0, 0x0) 10:53:30 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f00000000c0)={{0x0}, 0x0}, 0x20) 10:53:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f0000000000)=0x1ff, 0x4) getsockopt$inet6_tcp_int(r0, 0x6, 0x4, 0x0, &(0x7f0000000180)) 10:53:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040), 0x40) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000040)={'virt_wifi0\x00'}) ioctl(r0, 0x8b29, &(0x7f0000000040)) 10:53:30 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080), 0x80) 10:53:31 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x2, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r3, 0x84, 0x23, &(0x7f00000017c0), 0x8) ioctl$sock_SIOCDELRT(r3, 0x890c, &(0x7f0000000040)={0x0, @in={0x2, 0x4e23, @local}, @phonet={0x23, 0x9, 0x3, 0x6}, @rc={0x1f, @none, 0x8}, 0x6, 0x0, 0x0, 0x0, 0x750, &(0x7f0000000000)='wg1\x00', 0x2, 0x0, 0x3}) ppoll(&(0x7f0000002000)=[{r1, 0x2103, 0x64}], 0x1, &(0x7f0000000580)={0x0, r2+10000000}, 0x0, 0x0) 10:53:31 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040), 0x40) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000040)={'virt_wifi0\x00'}) ioctl(r0, 0x8b29, &(0x7f0000000040)) 10:53:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f0000000000)=0x1ff, 0x4) getsockopt$inet6_tcp_int(r0, 0x6, 0x4, 0x0, &(0x7f0000000180)) 10:53:31 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet(r0, &(0x7f0000002480)=[{{&(0x7f0000000040)={0x2, 0x0, @private=0xa010102}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000080)='p', 0x26718}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @private=0xa010102}, 0x10, &(0x7f0000000480)=[{&(0x7f00000003c0)="16", 0x1}], 0x1}}, {{&(0x7f00000004c0)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000007c0)=[{&(0x7f00000005c0)='5', 0x1}], 0x1}}], 0x3, 0x840) 10:53:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000000031ec0000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="4800000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000800)=@newtfilter={0x68, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xb}}, [@filter_kind_options=@f_bpf={{0x10, 0x1, 'bpf\x00'}, {0x3c, 0x2, [@TCA_BPF_FD={0x8}, @TCA_BPF_ACT={0x30, 0x1, [@m_bpf={0x2c, 0x0, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x68}}, 0x0) [ 190.279160][T12121] __nla_validate_parse: 59 callbacks suppressed [ 190.279182][T12121] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 10:53:31 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040), 0x40) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000040)={'virt_wifi0\x00'}) ioctl(r0, 0x8b29, &(0x7f0000000040)) [ 190.389632][T12125] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.1'. [ 190.487146][T12123] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 190.535332][T12123] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.1'. [ 190.821190][ C1] ================================================================================ [ 190.831054][ C1] UBSAN: shift-out-of-bounds in ./include/net/red.h:312:18 [ 190.838292][ C1] shift exponent 135 is too large for 64-bit type 'long unsigned int' [ 190.846549][ C1] CPU: 1 PID: 286 Comm: kworker/u4:5 Not tainted 5.11.0-syzkaller #0 [ 190.854655][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.864752][ C1] Workqueue: bat_events batadv_nc_worker [ 190.870454][ C1] Call Trace: [ 190.873763][ C1] [ 190.876632][ C1] dump_stack+0x141/0x1d7 [ 190.881026][ C1] ubsan_epilogue+0xb/0x5a [ 190.885494][ C1] __ubsan_handle_shift_out_of_bounds.cold+0xb1/0x181 [ 190.892309][ C1] ? ktime_get+0x1f4/0x230 [ 190.896783][ C1] ? pcibios_lookup_irq.cold+0x234/0x3d9 [ 190.902473][ C1] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 190.908240][ C1] ? ktime_get+0x19c/0x230 [ 190.912708][ C1] choke_enqueue.cold+0x18/0x3dd [ 190.917726][ C1] ? choke_dequeue+0x4c0/0x4c0 [ 190.922537][ C1] ? lock_release+0x720/0x720 [ 190.927274][ C1] ? do_raw_spin_lock+0x120/0x2b0 [ 190.932697][ C1] ? rwlock_bug.part.0+0x90/0x90 [ 190.937703][ C1] __dev_queue_xmit+0x1943/0x2e00 [ 190.942790][ C1] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 190.948128][ C1] ? lock_downgrade+0x6e0/0x6e0 [ 190.953039][ C1] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 190.958811][ C1] ? nf_hook_slow+0xf5/0x1e0 [ 190.963456][ C1] ? nf_hook+0x3fc/0x670 [ 190.967749][ C1] br_dev_queue_push_xmit+0x252/0x740 [ 190.973190][ C1] ? br_multicast_count+0x84/0xb40 [ 190.978397][ C1] ? br_fdb_offloaded_set+0xc0/0xc0 [ 190.983648][ C1] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 190.990045][ C1] __br_forward+0x46d/0x610 [ 190.994621][ C1] br_flood+0x3b2/0x450 [ 190.998848][ C1] br_dev_xmit+0xdf0/0x1690 [ 191.003400][ C1] ? br_netpoll_setup+0x1b0/0x1b0 [ 191.008550][ C1] dev_hard_start_xmit+0x1eb/0x920 [ 191.013710][ C1] __dev_queue_xmit+0x2121/0x2e00 [ 191.018786][ C1] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 191.025505][ C1] ? __ip6_finish_output+0x4c1/0xe10 [ 191.031010][ C1] ? mark_held_locks+0x9f/0xe0 [ 191.035806][ C1] ? rcu_read_lock_bh_held+0x25/0x60 [ 191.041136][ C1] ? ip6_finish_output2+0xdc8/0x1700 [ 191.046464][ C1] ip6_finish_output2+0x911/0x1700 [ 191.051623][ C1] __ip6_finish_output+0x4c1/0xe10 [ 191.056871][ C1] ip6_finish_output+0x35/0x200 [ 191.061775][ C1] ip6_output+0x1e4/0x530 [ 191.066151][ C1] ndisc_send_skb+0xa99/0x1750 [ 191.070957][ C1] ? ndisc_ifinfo_sysctl_change+0x5f0/0x5f0 [ 191.077065][ C1] ? ndisc_parse_options.part.0+0x510/0x510 [ 191.083016][ C1] ? memcpy+0x39/0x60 [ 191.087039][ C1] ? __ndisc_fill_addr_option+0xca/0x110 [ 191.092712][ C1] ndisc_send_rs+0x12e/0x700 [ 191.097339][ C1] addrconf_rs_timer+0x3f2/0x820 [ 191.102431][ C1] ? ipv6_get_lladdr+0x480/0x480 [ 191.107440][ C1] ? ipv6_get_lladdr+0x480/0x480 [ 191.112421][ C1] call_timer_fn+0x1a5/0x6b0 [ 191.117050][ C1] ? add_timer_on+0x4a0/0x4a0 [ 191.121778][ C1] ? _raw_spin_unlock_irq+0x1f/0x40 [ 191.127014][ C1] ? ipv6_get_lladdr+0x480/0x480 [ 191.131989][ C1] __run_timers.part.0+0x67c/0xa50 [ 191.137152][ C1] ? call_timer_fn+0x6b0/0x6b0 [ 191.142034][ C1] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 191.148350][ C1] run_timer_softirq+0xb3/0x1d0 [ 191.153238][ C1] __do_softirq+0x29b/0x9f6 [ 191.157796][ C1] asm_call_irq_on_stack+0xf/0x20 [ 191.162866][ C1] [ 191.165817][ C1] do_softirq_own_stack+0xaa/0xd0 [ 191.170875][ C1] irq_exit_rcu+0x134/0x200 [ 191.175552][ C1] sysvec_apic_timer_interrupt+0x4d/0x100 [ 191.181313][ C1] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 191.187330][ C1] RIP: 0010:check_kcov_mode+0x7/0x40 [ 191.192650][ C1] Code: fe ff ff 48 89 df e8 58 51 43 00 e9 a1 fe ff ff 48 8b 3c 24 e8 4a 51 43 00 e9 18 fe ff ff cc cc cc cc cc 65 8b 05 09 ef 8e 7e <89> c2 81 e2 00 01 00 00 a9 00 01 ff 00 74 10 31 c0 85 d2 74 15 8b [ 191.212289][ C1] RSP: 0018:ffffc9000176fc78 EFLAGS: 00000246 [ 191.218390][ C1] RAX: 0000000080000000 RBX: ffff8880574d57f0 RCX: ffff888012849bc0 [ 191.226414][ C1] RDX: ffff888012849bc0 RSI: ffff888012849bc0 RDI: 0000000000000003 [ 191.234421][ C1] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 191.242417][ C1] R10: ffffffff889f1fb7 R11: 0000000000000000 R12: ffffc9000176fda8 [ 191.250417][ C1] R13: 0000000000000000 R14: dffffc0000000000 R15: 00000000000002fe [ 191.258429][ C1] ? batadv_nc_worker+0x157/0xe50 [ 191.263503][ C1] __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 191.269617][ C1] batadv_nc_worker+0x157/0xe50 [ 191.274520][ C1] process_one_work+0x98d/0x1600 [ 191.279613][ C1] ? pwq_dec_nr_in_flight+0x320/0x320 [ 191.285043][ C1] ? rwlock_bug.part.0+0x90/0x90 [ 191.290019][ C1] ? _raw_spin_lock_irq+0x41/0x50 [ 191.295094][ C1] worker_thread+0x64c/0x1120 [ 191.299829][ C1] ? process_one_work+0x1600/0x1600 [ 191.305065][ C1] kthread+0x3b1/0x4a0 [ 191.309163][ C1] ? __kthread_bind_mask+0xc0/0xc0 [ 191.314312][ C1] ret_from_fork+0x1f/0x30 [ 191.318967][ C1] ================================================================================ [ 191.328309][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 191.334908][ C1] CPU: 1 PID: 286 Comm: kworker/u4:5 Not tainted 5.11.0-syzkaller #0 [ 191.343087][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.353164][ C1] Workqueue: bat_events batadv_nc_worker [ 191.358840][ C1] Call Trace: [ 191.362139][ C1] [ 191.365014][ C1] dump_stack+0x141/0x1d7 [ 191.369383][ C1] panic+0x306/0x73d [ 191.373311][ C1] ? __warn_printk+0xf3/0xf3 [ 191.377947][ C1] ? dump_stack+0x1c1/0x1d7 [ 191.382492][ C1] ? ubsan_epilogue+0x3e/0x5a [ 191.387298][ C1] ubsan_epilogue+0x54/0x5a [ 191.391834][ C1] __ubsan_handle_shift_out_of_bounds.cold+0xb1/0x181 [ 191.398640][ C1] ? ktime_get+0x1f4/0x230 [ 191.403094][ C1] ? pcibios_lookup_irq.cold+0x234/0x3d9 [ 191.408759][ C1] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 191.414517][ C1] ? ktime_get+0x19c/0x230 [ 191.418974][ C1] choke_enqueue.cold+0x18/0x3dd [ 191.423966][ C1] ? choke_dequeue+0x4c0/0x4c0 [ 191.428760][ C1] ? lock_release+0x720/0x720 [ 191.433479][ C1] ? do_raw_spin_lock+0x120/0x2b0 [ 191.438543][ C1] ? rwlock_bug.part.0+0x90/0x90 [ 191.443707][ C1] __dev_queue_xmit+0x1943/0x2e00 [ 191.448779][ C1] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 191.454138][ C1] ? lock_downgrade+0x6e0/0x6e0 [ 191.459043][ C1] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 191.464802][ C1] ? nf_hook_slow+0xf5/0x1e0 [ 191.469437][ C1] ? nf_hook+0x3fc/0x670 [ 191.473748][ C1] br_dev_queue_push_xmit+0x252/0x740 [ 191.479165][ C1] ? br_multicast_count+0x84/0xb40 [ 191.484314][ C1] ? br_fdb_offloaded_set+0xc0/0xc0 [ 191.489550][ C1] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 191.495837][ C1] __br_forward+0x46d/0x610 [ 191.500384][ C1] br_flood+0x3b2/0x450 [ 191.504859][ C1] br_dev_xmit+0xdf0/0x1690 [ 191.509400][ C1] ? br_netpoll_setup+0x1b0/0x1b0 [ 191.514484][ C1] dev_hard_start_xmit+0x1eb/0x920 [ 191.519642][ C1] __dev_queue_xmit+0x2121/0x2e00 [ 191.524715][ C1] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 191.530033][ C1] ? __ip6_finish_output+0x4c1/0xe10 [ 191.535362][ C1] ? mark_held_locks+0x9f/0xe0 [ 191.540168][ C1] ? rcu_read_lock_bh_held+0x25/0x60 [ 191.545495][ C1] ? ip6_finish_output2+0xdc8/0x1700 [ 191.550823][ C1] ip6_finish_output2+0x911/0x1700 [ 191.555984][ C1] __ip6_finish_output+0x4c1/0xe10 [ 191.561143][ C1] ip6_finish_output+0x35/0x200 [ 191.566035][ C1] ip6_output+0x1e4/0x530 [ 191.570409][ C1] ndisc_send_skb+0xa99/0x1750 [ 191.575213][ C1] ? ndisc_ifinfo_sysctl_change+0x5f0/0x5f0 [ 191.581155][ C1] ? ndisc_parse_options.part.0+0x510/0x510 [ 191.587105][ C1] ? memcpy+0x39/0x60 [ 191.591124][ C1] ? __ndisc_fill_addr_option+0xca/0x110 [ 191.596793][ C1] ndisc_send_rs+0x12e/0x700 [ 191.601423][ C1] addrconf_rs_timer+0x3f2/0x820 [ 191.606399][ C1] ? ipv6_get_lladdr+0x480/0x480 [ 191.611380][ C1] ? ipv6_get_lladdr+0x480/0x480 [ 191.616345][ C1] call_timer_fn+0x1a5/0x6b0 [ 191.620965][ C1] ? add_timer_on+0x4a0/0x4a0 [ 191.625774][ C1] ? _raw_spin_unlock_irq+0x1f/0x40 [ 191.631005][ C1] ? ipv6_get_lladdr+0x480/0x480 [ 191.635972][ C1] __run_timers.part.0+0x67c/0xa50 [ 191.641126][ C1] ? call_timer_fn+0x6b0/0x6b0 [ 191.645916][ C1] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 191.652223][ C1] run_timer_softirq+0xb3/0x1d0 [ 191.657114][ C1] __do_softirq+0x29b/0x9f6 [ 191.661666][ C1] asm_call_irq_on_stack+0xf/0x20 [ 191.666729][ C1] [ 191.669674][ C1] do_softirq_own_stack+0xaa/0xd0 [ 191.674730][ C1] irq_exit_rcu+0x134/0x200 [ 191.679269][ C1] sysvec_apic_timer_interrupt+0x4d/0x100 [ 191.685024][ C1] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 191.691038][ C1] RIP: 0010:check_kcov_mode+0x7/0x40 [ 191.696359][ C1] Code: fe ff ff 48 89 df e8 58 51 43 00 e9 a1 fe ff ff 48 8b 3c 24 e8 4a 51 43 00 e9 18 fe ff ff cc cc cc cc cc 65 8b 05 09 ef 8e 7e <89> c2 81 e2 00 01 00 00 a9 00 01 ff 00 74 10 31 c0 85 d2 74 15 8b [ 191.716085][ C1] RSP: 0018:ffffc9000176fc78 EFLAGS: 00000246 [ 191.722190][ C1] RAX: 0000000080000000 RBX: ffff8880574d57f0 RCX: ffff888012849bc0 [ 191.730199][ C1] RDX: ffff888012849bc0 RSI: ffff888012849bc0 RDI: 0000000000000003 [ 191.738201][ C1] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 191.746204][ C1] R10: ffffffff889f1fb7 R11: 0000000000000000 R12: ffffc9000176fda8 [ 191.754211][ C1] R13: 0000000000000000 R14: dffffc0000000000 R15: 00000000000002fe [ 191.762248][ C1] ? batadv_nc_worker+0x157/0xe50 [ 191.767318][ C1] __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 191.773429][ C1] batadv_nc_worker+0x157/0xe50 [ 191.778332][ C1] process_one_work+0x98d/0x1600 [ 191.783322][ C1] ? pwq_dec_nr_in_flight+0x320/0x320 [ 191.788736][ C1] ? rwlock_bug.part.0+0x90/0x90 [ 191.793710][ C1] ? _raw_spin_lock_irq+0x41/0x50 [ 191.798782][ C1] worker_thread+0x64c/0x1120 [ 191.803608][ C1] ? process_one_work+0x1600/0x1600 [ 191.808847][ C1] kthread+0x3b1/0x4a0 [ 191.812942][ C1] ? __kthread_bind_mask+0xc0/0xc0 [ 191.818104][ C1] ret_from_fork+0x1f/0x30 [ 191.823628][ C1] Kernel Offset: disabled [ 191.828124][ C1] Rebooting in 86400 seconds..