[info] Using makefile-style concurrent boot in runlevel 2. [ 24.717139] audit: type=1800 audit(1538443001.226:21): pid=5205 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2419 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.66' (ECDSA) to the list of known hosts. 2018/10/02 01:16:49 fuzzer started 2018/10/02 01:16:52 dialing manager at 10.128.0.26:37577 2018/10/02 01:16:52 syscalls: 1 2018/10/02 01:16:52 code coverage: enabled 2018/10/02 01:16:52 comparison tracing: enabled 2018/10/02 01:16:52 setuid sandbox: enabled 2018/10/02 01:16:52 namespace sandbox: enabled 2018/10/02 01:16:52 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/02 01:16:52 fault injection: enabled 2018/10/02 01:16:52 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/02 01:16:52 net packed injection: enabled 2018/10/02 01:16:52 net device setup: enabled 01:18:04 executing program 0: r0 = socket$inet(0x2, 0x4, 0x1) sendmsg(r0, &(0x7f0000000780)={&(0x7f0000000000)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(xts-camellia-asm,rmd256)\x00'}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000080)="6feedbee87d8753fae7e54cc0e64dd216ee05a70c5337c7bd9a140ffd6172a802738e907b9902da90c5ac6c18f2616d33f2f12c593ad81255bdbe97ec2796d83c03e0b17b61e4b736cadddcad38e1dc7baa27641942c0689888745770684f0441ef5e418cf3fc5b67eb411c4f31c867c3113993bb3980a32", 0x78}, {&(0x7f0000000100)="e8607d7d0483998c8d816754f3592d4a87617f4049c3612e84b82862902622b900d2803ace80ba49d7867671a71e50e5164af02cb4dbcff443d609a00d8872d1d581fb68e8fef071d68d1d79f75d7bbef7ef34db4c49a9969756218c47ce03c0e5b75c37b042f08c9519e64ae2ebf1fdcf7a1487fd6098f795998aecc74de965c23aee6b6604f4faaa5eece4b28544d0fd7d0893c83dff7da89cf3735d69c55844b95994aba6c80d506a78b0aee7a3039c90cd95258c180ab114ae2cfa599fe1cde93a30ba1733544ad608c22d2f6bae02091058818f", 0xd6}, {&(0x7f0000000200)="60fff023a55a7a53fd92a7a57adfffb4f8bf201c2485b2707c8d20580667b50a5a6f397b771074a66b27fe6fdaceaf0a21b1de17f54cece8976e3c60b4f1962eddff3ddb53e381a8f7d173a529d9e4d21c15ec50a292c90e67eb673f6ab065c6ee97bfba55ee67dabd246f9f13d6da8cc825c8c658ed4a79f01cd17646fe772824a64c4bf7c859b92b53d4c10443d9c7f1a622a3a206d435dee28421bee83b20a77baca20fd9808db0c366687075a4d82e4ed3eef8bfd5da3bfdc5dfcec7239c00fc341f9988a70b490ba45756acb0bb", 0xd0}, {&(0x7f0000000300)="ea8db92384bed9383decd4b85900deefd1adc713407a477c9da16343cac9c4b8872a835fcfa4d3339d651cc6eaa01b8009085eeaeed37988c7706a584ba8d53f", 0x40}, {&(0x7f0000000340)}, {&(0x7f0000000380)="dab41586d450c4e7753af9be64858888a70d4891ef6f6e9a881946d53dd204cd82fb3e9eed9443b7a2d739f2decbaf6205f1fd9ebf084c4c2873aa8931ad543714992e48a01b79ff239f74d7e70ad093572f86344ec83405b34e3d6e67b25af744a1a0b2ac118d25d357cb0a2fd6abf66e20550fd28cf98f7899a6794250bb386c9c982332c791f0543748c65c06a6b518b004db08c0c2971923caf3f4efca7ddd77413865b97ae1cf5b5c61ca9556d6a3e5c4cf409eb1", 0xb7}, {&(0x7f0000000440)="919b587f97402458ee00ec4407dda43d0eed4d9fdae0f68a7b2e786ad13f4bc1dbc3aa968e550144dc3598f8dc55b58b05708f469abd103a37915fc724d684ce064dd95b67f76641c6c7ed13f43f1c33a863fa3ee0e24c865ade9325bb3d9823229cc20016551dcc99609ba1841dc78272e5b70bbc3ffd3c1271f2376b4b7ad007a4a1e1d4bfba8781676390684c3d4c18040384aae7dfba130e475514382040c3fa8a58865eb4b035eeea5823a43f2fc54ee30d1e82f5b37b6f62b6323f03ea4c17f6186d1933ced547a60069f8cd53ed89faea488dac12c6720805e4a7dca4d9da906a6d921d571ab541ceae5a56d379b95b", 0xf3}], 0x7, &(0x7f00000005c0)=[{0xc8, 0x84, 0x8000, "49ab438672a81a2bc24769c25706c6eb5af511abea15e65c31d9b435aeff48e014c1837dbc651749636999124debedd0b443374751bb6ab552da71272b29a484c5456a819883ef09ffb5fcc8210aa4688ff5e5a5739cbd987278a92beb7f07c062877ffdba1b89722f97ed26992d6ad1eab0027b5dd1ba6efda4666a48d64eacf64586b08f729aa22f37dcd786cc83d8658f8fb44e4782f7ecbfae393e8bdbee122b8c3c859bf440e85e0b3c897319fe288012e0"}, {0xc0, 0x0, 0x2, "bd85050321e7daa07d33526804a56ed5163ddd2be3a57a720b306c9550f24d926b78dc1e364f225c26db5a668d81050746517cc1e461fdc5c1a48b687d76d462a89341e06cb6c6f18f8c2e3729a01755f775a0e41f573af492fe29fe4e40f93af1ac3f2dabb04a1887ae098ff96ba589e5470e3c1b6839956d69f351242c302b71b6e1c5a30db524c9fda31a0b5552f68685054e5b9b41257d47bf499d67b542159c40c00f8c26cacc8abe"}], 0x188, 0x4004000}, 0x4004000) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000007c0)={0x0, 0x1}, &(0x7f0000000800)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000840)={r1, 0x81, "bb1fd3dcbf3c3ce044c0c9a92c02f75cb35c55d3d1b2c0f7861a900d4ae5ffb3ee5572333fe9510b6f880bf5d3d40e1949d5ad96b6c1299667fdfa065ddec6e176ba2e306bbc0fdd26d7dd8fa5459f6ff1e8a51ee27f0cb76535f98c97d025b93f8ade847ce0a2e13601173ae9a2bca1ba25470a4c06196bbfb176f79275c1a11a"}, &(0x7f0000000900)=0x89) socketpair(0x4, 0x804, 0x4, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) accept$packet(0xffffffffffffffff, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000009c0)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000a00)={@empty, @dev={0xfe, 0x80, [], 0x1c}, @mcast1, 0x2112, 0x2a56f20f, 0x1ff, 0x400, 0x6, 0x40000, r5}) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000a80)={r1, 0x7ff, 0x7001}, 0x8) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000ac0)=0x200, 0x4) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000b00)={r1, 0xfffffffffffff800}, &(0x7f0000000b40)=0x8) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000b80)={r1, 0x0, 0x1}, 0x8) write$binfmt_elf32(r4, &(0x7f0000000bc0)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x1000, 0x8, 0xfffffffffffff800, 0x2, 0x2, 0x3e, 0x100, 0x2d7, 0x38, 0x132, 0x1, 0x5, 0x20, 0x1, 0x7a7, 0x9, 0x8be}, [{0x70000007, 0x9, 0x3, 0x8, 0x2, 0xffffffffffff133b, 0x20, 0x2a9}], "aaf4352f1a40ccdbf35b418c2ecf8a3e5624e3ec722d1fee08cdd6a1e869a85947ac99b069482ea1e51cd3ffe9bab8b503de7614ce2646be1fca138b2fffde1e4eb5d728ce41f15f7e69ed58118b700c1fcb133369c9a5fda0e9e3f50f6f1c4649b401935a417e7254be3037ad97ad374216fbc8fc51419728c9440a21ca69bed3eea70e7f6cfb01a51c2194e7a871f9820051fd28c8176291867f36", [[], [], [], [], [], [], []]}, 0x7f4) r6 = accept$packet(r4, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001400)=0x14) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000001440)={r2, 0x1}, &(0x7f0000001480)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f00000014c0)={0x100000001, 0x4, 0x9, 0x5, r2}, &(0x7f0000001500)=0x10) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000001540)={'mangle\x00'}, &(0x7f00000015c0)=0x54) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000001600), 0x4) write$binfmt_elf64(r3, &(0x7f0000001640)={{0x7f, 0x45, 0x4c, 0x46, 0x400, 0x5, 0x50b2, 0x100, 0x8, 0x3, 0x3, 0x4, 0x371, 0x40, 0x3d0, 0x1, 0x80000000, 0x38, 0x2, 0x3, 0x4, 0x3}, [{0x2, 0x7fff, 0x10000, 0xae87, 0x0, 0x0, 0x6, 0x10000}, {0x7, 0x40, 0x7, 0x0, 0x6, 0x80, 0x27, 0x1}], "4d2f09eb808175b894", [[], [], [], [], []]}, 0x5b9) getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000001c00), 0x2) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000001c80)={&(0x7f0000001c40)='\x00', r3}, 0x10) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000001cc0), &(0x7f0000001d00)=0xc) getgid() accept4$inet6(r3, &(0x7f0000001d40)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000001d80)=0x1c, 0x80800) r7 = openat$cgroup_ro(r3, &(0x7f0000001dc0)='memory.events\x00', 0x0, 0x0) epoll_wait(r3, &(0x7f0000001e00)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0xe00) sendmsg$nl_route(r4, &(0x7f0000001f80)={&(0x7f0000001e80)={0x10, 0x0, 0x0, 0x9000000}, 0xc, &(0x7f0000001f40)={&(0x7f0000001ec0)=@ipv4_delrule={0x60, 0x21, 0x400, 0x70bd2a, 0x3, {0x2, 0x0, 0x14, 0x0, 0x9, 0x0, 0x0, 0x4, 0x10}, [@FRA_GENERIC_POLICY=@FRA_DPORT_RANGE={0x8, 0x18, {0x4e21, 0x4e23}}, @FRA_SRC={0x8, 0x2, @multicast2}, @FRA_SRC={0x8, 0x2, @loopback}, @FRA_SRC={0x8, 0x2, @broadcast}, @FRA_GENERIC_POLICY=@FRA_IP_PROTO={0x8, 0x16, 0x2e}, @FRA_FLOW={0x8}, @FRA_DST={0x8, 0x1, @loopback}, @FRA_DST={0x8, 0x1, @loopback}]}, 0x60}}, 0x4805) setsockopt$IP_VS_SO_SET_EDIT(r7, 0x0, 0x483, &(0x7f0000001fc0)={0xaf, @multicast1, 0x4e21, 0x2, 'lblcr\x00', 0x21, 0x7, 0x54}, 0x2c) getgid() getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000002000)=""/122, &(0x7f0000002080)=0x7a) syzkaller login: [ 108.470414] IPVS: ftp: loaded support on port[0] = 21 01:18:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000200)={{{@in6, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000300)=0xe8) sendmsg$nl_route(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80004000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@bridge_newneigh={0x24, 0x1c, 0xd10, 0x70bd26, 0x25dfdbfd, {0xa, 0x0, 0x0, r2, 0x2, 0x80, 0x3}, [@NDA_LINK_NETNSID={0x8, 0xa, 0x7f}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004041}, 0x4000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f00000005c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0xa0040}, 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0xdc, r3, 0x0, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0x19}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1000}, @IPVS_CMD_ATTR_SERVICE={0x4}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7fffffff}]}, 0xdc}, 0x1, 0x0, 0x0, 0x51}, 0x40001) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000600)=0x1c, 0x4) sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80080000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x20, r3, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0x20}}, 0x4000) r4 = accept$inet(r1, &(0x7f0000000740), &(0x7f0000000780)=0x10) sendmsg$IPVS_CMD_SET_INFO(r4, &(0x7f00000008c0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x504000}, 0xc, &(0x7f0000000880)={&(0x7f0000000800)={0x54, r3, 0x14, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x80}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x81}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xffffffffffffffff}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x40000}, 0x40041) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000009c0)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)={0x14, r3, 0x20, 0x70bd28, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x40) setsockopt$IP_VS_SO_SET_ADDDEST(r4, 0x0, 0x487, &(0x7f0000000a00)={{0x62, @broadcast, 0x4e22, 0x0, 'nq\x00', 0x24, 0x6, 0x71}, {@empty, 0x4e22, 0x0, 0x3, 0xfff, 0x1ff}}, 0x44) sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000b80)={&(0x7f0000000a80), 0xc, &(0x7f0000000b40)={&(0x7f0000000ac0)={0x4c, r3, 0x608, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x50}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x72}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0x8000) pipe(&(0x7f0000000bc0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_bnep_BNEPCONNADD(r6, 0x400442c8, &(0x7f0000000c00)={r4, 0x3, 0xcf9, "10a0a8d86865466df15de79ccb1e5b76a4056747f2c30f52791f0f0048a3b92c739558866c776d158a15c552476ab9a127a7c8c4894f5b"}) getsockopt$inet_sctp_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f0000000c80)={0x0, 0x3c}, &(0x7f0000000cc0)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000d00)={r7, @in={{0x2, 0x4e24, @broadcast}}}, 0x84) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r6, 0x28, 0x6, &(0x7f0000000dc0), 0x10) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x76, &(0x7f0000000e00)={r7, 0x200}, 0x8) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000f00)={&(0x7f0000000e40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000ec0)={&(0x7f0000000e80)={0x24, r3, 0x800, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9bd}]}, 0x24}, 0x1, 0x0, 0x0, 0x4004015}, 0x20000040) setsockopt$bt_BT_CHANNEL_POLICY(r5, 0x112, 0xa, &(0x7f0000000f40)=0xfff, 0x4) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000f80)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000fc0)=[@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e23, @remote}, @in6={0xa, 0x4e21, 0x8554, @local, 0x100}, @in6={0xa, 0x4e24, 0x149, @local, 0xffffffff}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e24, 0x6, @loopback, 0x3}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e20, 0x1, @local, 0x59}, @in={0x2, 0x4e21, @local}], 0xc0) r8 = socket$alg(0x26, 0x5, 0x0) r9 = syz_genetlink_get_family_id$fou(&(0x7f00000010c0)='fou\x00') sendmsg$FOU_CMD_ADD(r5, &(0x7f0000001180)={&(0x7f0000001080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001140)={&(0x7f0000001100)={0x14, r9, 0x204, 0x70bd2d, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x24044804) setsockopt$sock_timeval(r8, 0x1, 0xec9e09868ff908eb, &(0x7f00000011c0)={0x0, 0x2710}, 0x10) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x73, &(0x7f0000001200)={r7, 0x4e, 0x30, 0x4, 0x1000}, &(0x7f0000001240)=0x18) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000001280)="76f5221ae7abf80a1f259ceb9baf863e275184bac377684c429a1cdad540442d1d72391a8c63f88ce990317e95e8c94f018350a44cf9d17207b78b5755f2297b238cd99a320637519f6e2303323de9310b1fe5801bcefb65dbad767d7b2963cc58c32d4804334b1d0b7f6fbb0b759a556626c098ca5e0d336792", 0x7a) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) [ 108.792298] IPVS: ftp: loaded support on port[0] = 21 01:18:05 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x4}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000000c0)={r1, 0x0, 0xb9, 0x9}, &(0x7f0000000100)=0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x40, r3, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x40}, 0x800) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000280)=@assoc_value={r2, 0xa2e}, 0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={r1, @in={{0x2, 0x4e22, @loopback}}, 0x49d, 0x1f, 0x6, 0xffff, 0x8}, &(0x7f0000000380)=0x98) preadv(r0, &(0x7f0000001900)=[{&(0x7f00000003c0)=""/37, 0x25}, {&(0x7f0000000400)=""/157, 0x9d}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/149, 0x95}, {&(0x7f0000001580)=""/166, 0xa6}, {&(0x7f0000001640)=""/253, 0xfd}, {&(0x7f0000001740)=""/17, 0x11}, {&(0x7f0000001780)=""/238, 0xee}, {&(0x7f0000001880)=""/58, 0x3a}, {&(0x7f00000018c0)=""/30, 0x1e}], 0xa, 0x0) setsockopt$inet_dccp_buf(r0, 0x21, 0xc0, &(0x7f00000019c0)="f4d8a0a695fd4b58c8982a485437062e5ea56b1ecd7a1f52f7d27bae9c8101fa92c8d1b287cff759dd446af3de44cfbe6c7c38a8b4d545b8661b87591139e05696e45c6ed7eee1b6149d8fff081c3726ea220666580076ce61cb9cf1d5a0760ae4cb857c903bb0530df5e87c60ec07bd98464b4b1e27bb5b0c73f5dc16a035345d3ba195eb63cdd7e94bb98fe15d94f814e7b8f17b7336f0b325c24a01737eedd7ef51517f2409a4b502112fdad1736818b7d5921127ecb83cd52d3e44a13c7bb150828513ffea3f71e24191", 0xcc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000001ac0)={r4}, 0x8) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000001b00)='tls\x00', 0x4) getsockopt(r0, 0x1, 0x82e5, &(0x7f0000001b40)=""/14, &(0x7f0000001b80)=0xe) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000001bc0), &(0x7f0000001c00)=0x4) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000001c40)=0x2, 0x4) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000001c80)=0x4, 0x4) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000001cc0)={0x8001, 0xffffffff, 0x2, 0xb3}, 0x10) getsockopt$inet_tcp_int(r0, 0x6, 0x1d, &(0x7f0000001d00), &(0x7f0000001d40)=0x4) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000001d80)=@assoc_id=r4, 0x4) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000001dc0)={r4, 0x5}, 0x8) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000001f80)={@remote, 0x0}, &(0x7f0000001fc0)=0x14) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000002000)={0x1, 0xb, &(0x7f0000001e00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x22c, 0x0, 0x0, 0x0, 0x8}, [@jmp={0x5, 0x401, 0x0, 0xf, 0xd, 0x30}, @generic={0x7, 0x1, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xe32f}, @jmp={0x5, 0x5, 0xd, 0x0, 0xf, 0xffffffffffffffff, 0xfffffffffffffffc}]}, &(0x7f0000001e80)='GPL\x00', 0x4000, 0x96, &(0x7f0000001ec0)=""/150, 0x40f00, 0x1, [], r5, 0xf}, 0x48) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000002080)={r2, 0x48ef}, &(0x7f00000020c0)=0x8) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000002100)=0x2, 0x4) setsockopt$XDP_RX_RING(r6, 0x11b, 0x2, &(0x7f0000002140)=0x1, 0x4) ioctl$sock_netdev_private(r0, 0x89fa, &(0x7f0000002180)="07a029b3f9845d34d6f5efad8d53e9bf740009e287fcae7d5323e383d769d76aafb975d81cce36259ba48b3a37d4947c26d70ceb9cfa5fb35fbfdd449e39e1c9a003bb597eea1b3ef89c03c15ed9ed8173b1e8c07136fe14dcd0115ca6dce22fa34024d1257fea6e67d671d2b57cb829ee0586a5d2ac6a57563f3eba29581ebf80cff19743ed3d8686827c56dcdfc50049c8a770155d3fa334871360346d982a22") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000002240)={{0xa, 0x4e22, 0x8, @mcast1, 0x5}, {0xa, 0x4e24, 0xfffffffffffffff8, @mcast1, 0x2}, 0x4, [0x3, 0x9, 0x63, 0x0, 0x7, 0x0, 0x7, 0xe6]}, 0x5c) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)={0xffffffffffffffff}) getsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000002300)=""/4096, &(0x7f0000003300)=0x1000) ioctl$sock_inet_SIOCSIFBRDADDR(r8, 0x891a, &(0x7f0000003340)={'lo\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xb}}}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000003380)={r7, 0xc5fd}, &(0x7f00000033c0)=0x8) [ 109.142550] IPVS: ftp: loaded support on port[0] = 21 01:18:05 executing program 3: r0 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14, 0x80000) getsockopt$packet_int(r0, 0x107, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)={'team0\x00', r1}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$cgroup_ro(r3, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) ioctl$sock_bt_hci(r5, 0xc00448ff, &(0x7f00000001c0)="2cc64e39e7143930f24f43a159d8ecbb323582008dc4f3bc105e4dc2803d4fd1add9507fa6bb1b2ce155af08f0f3d828a9fe371307c708cbd27e829d7880e6655b1193ec326303f15e809c7b078b5d92f558bc127399e61cc87d08e91ca48e50e9fc6413cf374a94a88de7354f1b35ef0da4178c792c224c") r6 = socket$inet6_dccp(0xa, 0x6, 0x0) pselect6(0x40, &(0x7f0000000240)={0xfff, 0x1ff, 0xfffffffffffffffe, 0x9, 0xaede, 0x90000000000000, 0x7, 0x2}, &(0x7f0000000280)={0x6, 0x2, 0x9, 0x9, 0x7, 0x6, 0x7, 0x800}, &(0x7f00000002c0)={0x57af, 0x8001, 0xffff, 0x7bc, 0xfffffffffffff801, 0x4, 0xef0e}, &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f0000000380)={&(0x7f0000000340)={0x8001}, 0x8}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_int(r7, 0x1, 0x2a, &(0x7f00000003c0)=0x9c14, 0x4) setsockopt$bt_hci_HCI_TIME_STAMP(r3, 0x0, 0x3, &(0x7f0000000400)=0x4, 0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000000440)={0x0, 0xa5, "2df4748cd5726b09050ce412e98c0e7852cbdaae97f63587901d7a319a5fffb533569f12358f9d2429c372e1ef95e85e52beadddd0d469f777663a6392ebe5ce975b2f4ee5dd062f4ea3bce5dcb9bfc7364b756c7f498167c6fc9945a03356404d15345e3908d11c037017d09216ab2e22c5763b120ee95c40afbc5f0342bdfcb4ae180eaab9b19f14679d35af01207ef264b428a8e7a4f712439b823ae32ffffeaa4ab73c"}, &(0x7f0000000500)=0xad) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000540)={r8, 0x8, 0x7, [0x5, 0x10000, 0x6cee2713, 0xab, 0x1, 0x9, 0x800]}, &(0x7f0000000580)=0x16) bind$packet(r0, &(0x7f00000005c0)={0x11, 0x1, r2, 0x1, 0x6, 0x6, @remote}, 0x14) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000600), &(0x7f0000000640)=0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000680)={r8, @in6={{0xa, 0x4e24, 0x7a28, @mcast2, 0x5a25}}, 0x7ff, 0x1, 0x9, 0x924a, 0x1}, &(0x7f0000000740)=0x98) accept$packet(r4, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000007c0)=0x14) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000800)={0x0, 0x0}, &(0x7f0000000840)=0xc) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000880)={{{@in=@multicast2, @in=@loopback, 0x4e20, 0x800, 0x4e22, 0x6, 0xa, 0xa0, 0xa0, 0x3f, r11, r12}, {0x2, 0x9, 0x0, 0xfff, 0x5, 0x401, 0x4aa2}, {0x100000000, 0x7, 0x80000001}, 0x3, 0x0, 0x1, 0x1, 0x2}, {{@in6=@mcast2, 0x4d3, 0xff}, 0x2, @in6=@dev={0xfe, 0x80, [], 0x20}, 0x3502, 0x0, 0x3, 0xf433, 0x5, 0x80, 0x21}}, 0xe8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000980)={0x0, 0x7, 0x2, 0x4, 0x8, 0x1, 0x0, 0x400, r10}, &(0x7f00000009c0)=0x20) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f0000000a00)={@loopback, @dev={0xfe, 0x80, [], 0x13}, @ipv4={[], [], @rand_addr=0x4}, 0x101, 0x6, 0xe7a6, 0x100, 0xbac, 0x1000000, r2}) setsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000a80)={@rand_addr=0x1, @multicast2, r11}, 0xc) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000ac0)={0x0, 0xc, 0xff, 0x401, r9}, &(0x7f0000000b00)=0x10) r13 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000b80)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f0000000cc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x40082020}, 0xc, &(0x7f0000000c80)={&(0x7f0000000bc0)={0xc0, r13, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x1d}]}, @IPVS_CMD_ATTR_DAEMON={0x60, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'irlan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}]}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_team\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x10001}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x80}, 0x0) socket$pppoe(0x18, 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f0000000d00)={r10, @in={{0x2, 0x4e22, @broadcast}}, [0x9, 0xa7, 0x85, 0x6, 0x80000001, 0x4, 0x5, 0x6, 0x7f, 0x7a905a8d, 0x6, 0x5, 0xffffffffffffffc1, 0x6, 0x370]}, &(0x7f0000000e00)=0x100) r14 = accept(r5, 0x0, &(0x7f0000000e40)) sendmsg$IPVS_CMD_GET_DEST(r14, &(0x7f0000000f80)={&(0x7f0000000e80)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000f40)={&(0x7f0000000ec0)={0x68, r13, 0x30d, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80000001}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x68}, 0x1, 0x0, 0x0, 0x4}, 0x4090) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000fc0)={@multicast1, @local}, &(0x7f0000001000)=0xc) [ 109.613961] IPVS: ftp: loaded support on port[0] = 21 [ 109.813803] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.832274] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.839984] device bridge_slave_0 entered promiscuous mode 01:18:06 executing program 4: r0 = socket$pptp(0x18, 0x1, 0x2) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={r0}) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f00000000c0)=0xff, 0x4) pwrite64(r0, &(0x7f0000000100)="d8011a6e95bf62217636029ddbfe5c33a5d19aa062202566869c0588e55248fa1511a7a268eb01b819ca8a83a8e0c940caec74524fbabe413f560748e531e07850b65a4c0ae5b4d65343b5a952587428cd072549b289d750f9cff34c2b96834fa26d535ed7492708b81469c16ebb084658c51513ca1156e247ae10f6729ecc100c73fa28caa09eaf7bd06e5928defecb86a1b53c2a1ddf994f5be8242dfcc2fdcce0ba274a94d97bb138f3fafed646abf5623d870fd7b73419f6b1de902b0d09", 0xc0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x11, &(0x7f00000001c0)=0x9, 0x4) bind$alg(r1, &(0x7f0000000200)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes128\x00'}, 0x58) connect$bt_rfcomm(r1, &(0x7f0000000280)={0x1f, {0x0, 0x6, 0x6, 0x5, 0xb52, 0x4}, 0xffffffffffffffff}, 0xa) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) connect$bt_l2cap(r1, &(0x7f00000002c0)={0x1f, 0x7, {0x8, 0x3, 0x3, 0x5, 0x1, 0x7}, 0x4, 0x7}, 0xe) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0xe6, 0x4) r2 = socket$inet6(0xa, 0x80007, 0x2) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), 0x4) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f00000003c0)={@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e20, @rand_addr=0x1}, 0x2, 0x1, 0x3, 0x3}}, {&(0x7f0000000340)=""/48, 0x30}, &(0x7f0000000380), 0x10}, 0xa0) getsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000480), &(0x7f00000004c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000500)={'veth0_to_bridge\x00', {0x2, 0x4e24}}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0xb4, 0x7, {"77eb96aa8cfb44861e0f0d244ee7791e9d28fd90cb220af1b76b6a73d2890dc98330aa055440144a55cc76b616450508fefd4ad04beff355c4e70c3399a854d85546bca5d2e13c691a4c68bd872bc0838ee85ea35f6e17d8614732562ed1e2c3ef9f3fa5231e2b91dc5530bc47579105c2b16fbc0c04c06e864d510b2d23cf4e5cf3a1a46406506928fe34144e0878cb2f06e8bec2475b47e679"}}, {0x0, "3b73ac995536246866b67a11139f782eba0af88b45a8ebdd466831d52a31b955bd41e0cd25390071d1658b412469c369afbe4513db57af27b085bf5f8121b22e89924cf0c9d786ad8369e4bdd930304eb60c6b3b96a4551e9ed004c26daf2d8e29a8daa76eaab817a8694c27bbdfbe384567f1e2f33d00a9749d5126cdcd200396edb3892b1123265b6bc1b96c87d9c39cb088d95024e6e630711fad"}}, &(0x7f00000006c0)=""/180, 0x152, 0xb4}, 0x20) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000007c0)={0x0, 0x4d, "b239c9998cd8010324b2e4705da7ecc264370d2865595c1506bed29a558d25b85519a0f204279a7c791b236f825225317ea36c37aa2e17ce1f383b3f2c009ff34a511b57ebcc528f5cd44caea9"}, &(0x7f0000000840)=0x55) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000880)={r3, @in={{0x2, 0x4e21, @local}}}, 0x84) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000940), &(0x7f0000000980)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000009c0)={{{@in=@rand_addr, @in6=@ipv4={[], [], @dev}}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000000ac0)=0xe8) connect$pppoe(r1, &(0x7f0000000b00)={0x18, 0x0, {0x3, @remote, 'vcan0\x00'}}, 0x1e) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000b40)={r3, @in={{0x2, 0x4e21, @loopback}}, 0x20, 0x6}, 0x90) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f0000000c00)={{0xa, 0x4e23, 0x8, @remote, 0xa}, {0xa, 0x4e21, 0x0, @remote, 0x7}, 0x1, [0x80000000, 0xcd76, 0x7, 0x7fff, 0x5a07, 0x100, 0x7, 0x10001]}, 0x5c) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000c80)=0x2000) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000cc0)={@in={{0x2, 0x4e24, @loopback}}, 0xc3b, 0x2, 0x3, "88a8e988cbb3cddf03b58e2bc0a7343593e0ff83eec9b09591df7552a5f56728f5179020b0a96c0a2a81b845198a5da55b2ce1ad488a0b22238abf90821c8f7827afffac031d981561501a1b66e0a5e7"}, 0xd8) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000dc0)={'nat\x00'}, &(0x7f0000000e40)=0x54) getsockname(r1, &(0x7f0000000e80)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000f00)=0x80) getsockopt$inet_sctp6_SCTP_NODELAY(r5, 0x84, 0x3, &(0x7f0000000f40), &(0x7f0000000f80)=0x4) [ 109.939079] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.952781] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.967376] device bridge_slave_1 entered promiscuous mode [ 110.171259] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 110.179283] IPVS: ftp: loaded support on port[0] = 21 [ 110.359348] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 01:18:07 executing program 5: socketpair(0xf, 0x0, 0x400, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000040)={'sit0\x00', 0x3f}) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000080)={'nr0\x00', 0x2}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x0, 0x4) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x1, 0x4) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e24, @multicast1}, 0x10) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) getpeername$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@multicast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@local, 0x4e22, 0x8, 0x4e22, 0x5, 0xe3e72ce4e82d18f0, 0xa0, 0xa0, 0x2d, r2, r3}, {0x3, 0x0, 0x161, 0x0, 0x1, 0x0, 0x7, 0x400}, {0x7, 0xad10, 0x3bd4e672, 0x9}, 0x1, 0x6e6bb4, 0x0, 0x1, 0x1, 0x1}, {{@in6=@loopback, 0x4d2, 0x3c}, 0x2, @in6, 0x3507, 0x2, 0x3, 0x112, 0x85, 0x3, 0x20}}, 0xe8) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000400)={{0xa, 0x4e23, 0xfff, @loopback, 0x5}, {0xa, 0x4e24, 0x1ff, @remote, 0x20}, 0x9, [0xe469, 0x3, 0x7f, 0x9, 0xffff, 0x100000001, 0x0, 0x7]}, 0x5c) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000480)={'ip6tnl0\x00', {0x2, 0x4e20, @broadcast}}) connect$netlink(r1, &(0x7f00000004c0)=@unspec, 0xc) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000500)=0xfffffffffffffffd, &(0x7f0000000540)=0x4) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000580)=0x48, 0x4) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f00000005c0), &(0x7f0000000600)=0x8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000640)={{{@in6}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f0000000740)=0xe8) r4 = socket$netlink(0x10, 0x3, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt(r5, 0x800, 0x81, &(0x7f00000007c0)=""/156, &(0x7f0000000880)=0x9c) ioctl$sock_ifreq(r0, 0x8970, &(0x7f00000008c0)={'eql\x00', @ifru_names='veth1\x00'}) bind$bt_hci(r0, &(0x7f0000000900)={0x1f, r2, 0x3}, 0xc) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000940)={0x7fff}, 0x4) setsockopt$packet_buf(r0, 0x107, 0x1, &(0x7f0000000980), 0x0) getsockopt$sock_buf(r6, 0x1, 0x3b, &(0x7f00000009c0)=""/56, &(0x7f0000000a00)=0x38) ioctl$sock_bt_hci(r0, 0x400448ff, &(0x7f0000000a40)="a1e268e0e283fe677b8af3bd5d9f2882b27969e763ad5bd748824454237065fa5948f26a1d5944121f412070ee395093598dcb21b525ec169ad2df7e0a374a9a7c28973cbd95c95b95f9f212a39fd4e78bfe11096b5592157add51850a57e821478888a6e541e061b3004f58dfa748178ad8645f4757777fdc77bf61d1396715486989f857381214d08248e0cdf409c7366595094cd9484549b3951f0b92") getsockname$unix(r4, &(0x7f0000000b00)=@abs, &(0x7f0000000b80)=0x6e) recvfrom$packet(r1, &(0x7f0000000bc0)=""/165, 0xa5, 0x40000100, &(0x7f0000000c80)={0x11, 0x1, r2, 0x1, 0xf5b, 0x6, @random="3b148b3bac2f"}, 0x14) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000cc0)={0x0, 0x0, 0x6, 0x7}, &(0x7f0000000d00)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f0000000d40)={0x0, 0x40}, &(0x7f0000000d80)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000dc0)={r7, 0xb5c, 0xec, 0xfffffffffffffffd, 0x9ba, 0x1, 0x1, 0xff, {r8, @in6={{0xa, 0x4e21, 0xffffffffffffffff, @local, 0x7}}, 0x1, 0x5, 0x4, 0x8, 0x40}}, &(0x7f0000000e80)=0xb0) [ 110.710913] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 110.838803] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 110.890049] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.916842] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.924227] device bridge_slave_0 entered promiscuous mode [ 110.946217] IPVS: ftp: loaded support on port[0] = 21 [ 111.102826] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.117285] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.124694] device bridge_slave_1 entered promiscuous mode [ 111.254165] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 111.432906] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 111.498076] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 111.505813] team0: Port device team_slave_0 added [ 111.538021] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.549555] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.577440] device bridge_slave_0 entered promiscuous mode [ 111.666599] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 111.677172] team0: Port device team_slave_1 added [ 111.737439] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.743814] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.753349] device bridge_slave_1 entered promiscuous mode [ 111.785977] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 111.821071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 111.838015] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 111.898580] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 111.911264] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.921148] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.937101] device bridge_slave_0 entered promiscuous mode [ 111.960661] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 111.973998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 112.028515] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 112.079499] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 112.090235] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.103475] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.111545] device bridge_slave_1 entered promiscuous mode [ 112.120280] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 112.146693] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 112.187321] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 112.220542] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 112.246771] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 112.254449] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 112.267611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 112.367812] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 112.434288] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 112.476171] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 112.490717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 112.507542] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.513904] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.526858] device bridge_slave_0 entered promiscuous mode [ 112.557056] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 112.661041] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.667747] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.677509] device bridge_slave_1 entered promiscuous mode [ 112.748564] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 112.759584] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 112.782021] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 112.796227] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 112.881377] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 112.920940] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 112.945309] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 112.963659] team0: Port device team_slave_0 added [ 112.971734] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 112.998594] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 113.124451] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 113.157501] team0: Port device team_slave_1 added [ 113.297936] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 113.334863] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.356560] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.364397] device bridge_slave_0 entered promiscuous mode [ 113.399167] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 113.415501] team0: Port device team_slave_0 added [ 113.431885] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 113.453306] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.472982] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.488760] device bridge_slave_1 entered promiscuous mode [ 113.503790] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 113.525199] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 113.538203] team0: Port device team_slave_1 added [ 113.543629] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 113.558510] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 113.596028] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 113.626896] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 113.634271] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 113.643050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 113.678153] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 113.725050] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 113.733464] team0: Port device team_slave_0 added [ 113.742349] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 113.757298] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 113.764132] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 113.787382] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 113.806965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 113.820666] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 113.844435] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 113.853500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 113.880412] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 113.891000] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.897565] bridge0: port 2(bridge_slave_1) entered forwarding state [ 113.904424] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.910845] bridge0: port 1(bridge_slave_0) entered forwarding state [ 113.919573] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 113.926914] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 113.935656] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 113.955919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 113.987259] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 113.994884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 114.015561] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 114.023853] team0: Port device team_slave_1 added [ 114.033607] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 114.079479] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 114.090044] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 114.131403] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 114.149263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 114.167420] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 114.251154] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 114.266857] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 114.274559] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 114.307274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 114.321374] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 114.329004] team0: Port device team_slave_0 added [ 114.378661] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 114.426831] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 114.434009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 114.444161] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 114.463451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 114.475035] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 114.483291] team0: Port device team_slave_1 added [ 114.500096] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 114.566982] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 114.573835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 114.587097] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 114.597929] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 114.605039] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 114.627238] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 114.641431] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 114.657138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 114.672639] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 114.716010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 114.726000] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 114.803025] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 114.827218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 114.859955] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 114.872934] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 114.884845] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 114.967930] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 114.978186] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 114.986180] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 115.209078] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 115.228590] team0: Port device team_slave_0 added [ 115.353894] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 115.367987] team0: Port device team_slave_1 added [ 115.485531] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.491960] bridge0: port 2(bridge_slave_1) entered forwarding state [ 115.498667] bridge0: port 1(bridge_slave_0) entered blocking state [ 115.505023] bridge0: port 1(bridge_slave_0) entered forwarding state [ 115.520961] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 115.538996] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 115.561049] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 115.569225] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 115.670164] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 115.687745] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 115.696693] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 115.807687] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 115.814855] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 115.835072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 115.896861] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.903240] bridge0: port 2(bridge_slave_1) entered forwarding state [ 115.909959] bridge0: port 1(bridge_slave_0) entered blocking state [ 115.916359] bridge0: port 1(bridge_slave_0) entered forwarding state [ 115.943339] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 116.017700] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 116.025650] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 116.057358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 116.180044] bridge0: port 2(bridge_slave_1) entered blocking state [ 116.186483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 116.193137] bridge0: port 1(bridge_slave_0) entered blocking state [ 116.199552] bridge0: port 1(bridge_slave_0) entered forwarding state [ 116.219327] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 116.446573] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 116.463042] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 116.485328] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 116.605188] bridge0: port 2(bridge_slave_1) entered blocking state [ 116.611660] bridge0: port 2(bridge_slave_1) entered forwarding state [ 116.618393] bridge0: port 1(bridge_slave_0) entered blocking state [ 116.624747] bridge0: port 1(bridge_slave_0) entered forwarding state [ 116.641527] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 117.469292] bridge0: port 2(bridge_slave_1) entered blocking state [ 117.475699] bridge0: port 2(bridge_slave_1) entered forwarding state [ 117.482588] bridge0: port 1(bridge_slave_0) entered blocking state [ 117.488996] bridge0: port 1(bridge_slave_0) entered forwarding state [ 117.514244] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 117.531681] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 117.555925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 119.719754] 8021q: adding VLAN 0 to HW filter on device bond0 [ 120.312114] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 120.749868] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 120.756047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 120.765695] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 121.002737] 8021q: adding VLAN 0 to HW filter on device bond0 [ 121.205410] 8021q: adding VLAN 0 to HW filter on device team0 [ 121.246598] 8021q: adding VLAN 0 to HW filter on device bond0 [ 121.385525] 8021q: adding VLAN 0 to HW filter on device bond0 [ 121.447248] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 121.658365] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 121.708182] 8021q: adding VLAN 0 to HW filter on device bond0 [ 121.889489] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 121.895677] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 121.917233] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 121.988016] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 122.144124] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 122.157554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 122.164712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 122.196087] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 122.394517] 8021q: adding VLAN 0 to HW filter on device team0 [ 122.468774] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 122.474956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 122.497131] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 122.607081] 8021q: adding VLAN 0 to HW filter on device team0 [ 122.665772] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 122.686879] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 122.695848] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 122.908782] 8021q: adding VLAN 0 to HW filter on device bond0 [ 122.952857] 8021q: adding VLAN 0 to HW filter on device team0 [ 123.193729] 8021q: adding VLAN 0 to HW filter on device team0 [ 123.345834] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 123.922542] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 123.961006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 123.975750] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 124.441020] 8021q: adding VLAN 0 to HW filter on device team0 01:18:21 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet6(0xa, 0x80000, 0x3f) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000180)={0x92a1, 0x7ff, 0x0, 0x46, 0xf, 0x100000001, 0x7, 0x7, 0x0}, &(0x7f00000001c0)=0x20) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000200)={r2, 0x7fffffff}, 0x8) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000001d80)={'gre0\x00', 0x0}) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r4}, 0x58) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c5f720000000000000000000000000000ab07dd0e0000000000000000000000000008000000000000bf4ff0a8612ba4000000000000000038000000000000000000000000000000000000000000000000000000000000000ef60000020000000000000000000000000000000000000000"], 0x78) 01:18:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = accept(r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x5}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x1, 0x2}, 0x8) connect$vsock_dgram(r1, &(0x7f0000000180)={0x28, 0x0, 0x2710, @host}, 0x10) ioctl$sock_inet_SIOCDARP(r0, 0x8955, &(0x7f0000000100)={{}, {0x0, @local}, 0x28, {0x2, 0x0, @rand_addr}, "00000000000100"}) 01:18:21 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000300)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) r1 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r1, &(0x7f0000002a40)={&(0x7f0000001800)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000029c0)=[{&(0x7f0000001880)=""/79, 0x4f}, {&(0x7f0000001900)=""/4096, 0x1000}, {&(0x7f0000002900)=""/142, 0x8e}], 0x3, &(0x7f0000002a00)=""/52, 0x34, 0x7}, 0x2000) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000540)="91fb5f164431da5c7a3b46ad865244f4a6043d9b501eefcb4a924b5bd45b44d22f6e33252a117aa9fea5caf9db7d8a56c5f6a25d819e49a959cb0b7c10d296a9105df10be9a483dc832aa7166b42cc86746bf0d85e27231db43f9e4ab154ec1c117d02b5aa8c5784ccfc77e2d0aa973b1cf21b195faec1e3e161a2f9d386e38d6d06658519a6c94e2bb85a90ae51c0993d1adca2ebf661695112352ca62c37943cde5ba671cc6d7b0ba9b9985faddc375d6d37b3e5ead172158a7fd6a334e94697f0645886f0ad1732fe81eb5dd793506aae351d91dd69ea5744b95d8ac4b31acbc458be", 0xe4}, {&(0x7f0000000040)="0d6d210f5b464b7ad4b54fc58eb42afbc3a8b1b84b42d24ed560f66017ecb9339f3eb5a1a72d8ce6b7611583a36fef39b86a9e28c100cd542b1591a595097daecb32424b8bc965a25f92b47ce332e5bdb008ae1cb980b792cb6e8901081d", 0x5e}], 0x2, 0x8) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x2, 0x3a, 0x0, @remote, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000100)) 01:18:21 executing program 1: r0 = socket(0xc, 0xe, 0x4) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) 01:18:22 executing program 1: socket$inet6(0xa, 0x80003, 0x800000000000006) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4e20, 0xfffffffffffffffc, @empty, 0x1}, 0xffffffffffffffeb) syz_emit_ethernet(0x140, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaabaaaa1280c200000086dd60d8652b00740600fe8000000000000000001000000000aafe80000000000000000000000000002a00004e209770d36a71b5c2bc16e01a1f7ba2ac5be613e7e7f87a0ddd3472d325c2221a5ba94bcea8cecebe38ef56d6c41bb350ec1c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], &(0x7f00000002c0)) 01:18:22 executing program 2: socketpair(0x8, 0xe, 0x7, &(0x7f0000000040)={0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000004180)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000003c0)=""/204, 0xcc}, {&(0x7f0000000280)=""/138, 0x8a}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/128, 0x80}, {&(0x7f0000000200)=""/54, 0x36}], 0x5, 0x0, 0x0, 0x4}, 0x8000}, {{&(0x7f0000000640), 0x80, &(0x7f0000003a80)=[{&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f00000006c0)=""/24, 0x18}, {&(0x7f00000028c0)=""/4096, 0x1000}, {&(0x7f0000000700)=""/219, 0xdb}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/81, 0x51}, {&(0x7f00000038c0)}, {&(0x7f0000003900)=""/254, 0xfe}, {&(0x7f0000003a00)=""/119, 0x77}], 0x9, &(0x7f0000003b40)=""/65, 0x41, 0x81}, 0x80}, {{0x0, 0x0, &(0x7f0000003cc0)=[{&(0x7f0000003bc0)=""/111, 0x6f}, {&(0x7f0000003c40)=""/116, 0x74}], 0x2, 0x0, 0x0, 0x13bf}, 0xffff}, {{&(0x7f0000003d00)=@can, 0x80, &(0x7f0000004040)=[{&(0x7f0000003d80)=""/168, 0xa8}, {&(0x7f0000003e40)=""/8, 0x8}, {&(0x7f0000003e80)=""/137, 0x89}, {&(0x7f0000003f40)=""/220, 0xdc}], 0x4, &(0x7f0000004080)=""/236, 0xec, 0x100000000}, 0x7}], 0x4, 0x10000, &(0x7f0000004280)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000180)={'IDLETIMER\x00'}, &(0x7f00000001c0)=0x1e) r1 = socket(0x10, 0x80002, 0x0) recvmsg(r1, &(0x7f0000000600)={&(0x7f0000000340), 0x80, &(0x7f0000000840), 0x0, &(0x7f00000008c0)=""/4096, 0x1000}, 0x0) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000240)=0x40, 0x4) sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x2c}, 0x14}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 01:18:22 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4a) sendmsg(r1, &(0x7f0000000580)={&(0x7f0000000140)=@sco, 0x80, &(0x7f0000000040)=[{&(0x7f00000001c0)="b6", 0x1}], 0x1, &(0x7f0000000400)}, 0x8000) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100), 0x28) [ 125.790489] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:18:22 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x11ce}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000140)={r1, 0x1, 0x5}, 0x8) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000040), 0x4) sendmmsg(r0, &(0x7f0000006100)=[{{&(0x7f00000030c0)=@hci, 0x80, &(0x7f00000032c0)=[{&(0x7f0000003140)="f6", 0x1}], 0x1, &(0x7f0000003300)}}], 0x1, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 01:18:22 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000000)) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) 01:18:22 executing program 3: socket$inet6(0xa, 0xa, 0x100000000) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000006c0)={'veth1\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="1900000000000000a90cd279feac30e0ff8a7b2f4f47d29c3df56afaffdfb2c480a615a133d94c7d72371916cdeeca53ce2a43367253da415922c57780ef5fb53aa40fcda494c2065b8718c19bdb500347b76a89443f983276cc233a0d1b653c01f616e0ba2ea8d696c46545e62b41b9bf994f29bee79a250e649ebcda01c6967541c01ab60f89c5691775fd93c99f9c49c55ba16505f83e2ed22002cbfd41e7b3e8b6cbea6496b861502e40eaca84a03e7c3677a8fd52d500048017bd7a3871190ef1fc8d69ae999f739d82ae6f09e9931924c0"]}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r1, r2, &(0x7f0000000040)=0xfffffffffffffbff, 0x80000000) socketpair(0x10, 0x80003, 0x8, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f00000001c0)=0x7fffffff, 0x4) 01:18:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000040)) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000200)={0x0, @multicast2, 0x0, 0x4, "00000000000000000002d8ba00", 0x8, 0x0, 0x27}, 0x2c) sendmsg$alg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0xffffffffffffff07, &(0x7f0000000700)=[{&(0x7f00000023c0)=""/4096, 0xbb05}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:18:23 executing program 5: sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000780), 0xc, &(0x7f0000000880)={&(0x7f0000000300)=ANY=[]}}, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) socketpair$inet6(0xa, 0x807, 0xcd9c, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) r2 = openat$cgroup_int(r0, &(0x7f0000000100)='memory.high\x00', 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r0, 0x1, 0x1, 0x8, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x20) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000180)="18bc7f01be0643c29c27caea235d62deb2cf27556237e78b2887ddac6e2334f7ebfd900ad65011366c4c01a7158429d82df6d5c32e25f992eded4504e44a111762030605baefd2285c9f09e9ae8d2bb9c5644a532e3b831006aa70ee07ec202e47463b0b222dd4f9a2444e3d1a28495f345ca51c4a539362cc087d7ebf10633cdeeb11e0448617ed08807f47df45175f657cf8167e3b78f6ed9d255d51c85e91954feeb361a9d8426a49ace6e4833fb92feb96ee70750a6a66664dcfa22bc1b6282166d7c3c106855f69c7b5c7332b", 0xcf}, {&(0x7f0000000280)="6bf2225712a82a6c4d2848c19baf829ff06d0f2c54649a4814235ba6ce7f109f410ac84f24a218c7d0efa32cbd83f76909dfa01f64a076ea8d2ea9b83fa0cd2ac5eb56501cbea0eeadd4410b7fa9663b750d9642999a8b78dfbd54b73abed0505dd8614dcfedae2badd2e17c997141b7ef2cfc403aca1435ce13f8ed12487df80d53de03341bdbf1bf157c8e771366df9d575a81047ed00f6779aaedbac8b29beb22c3e9734c64d9672b772113875a5f66d441902a2c0ffedcbf38b6", 0xbc}], 0x2) 01:18:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000280a26dde896748b050d600611840"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x10, 0x5, &(0x7f0000000040)=@framed={{}, [@jmp]}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x1f3, &(0x7f0000000300)=""/187}, 0x48) r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000140)={0x2, 0x0, @broadcast}, &(0x7f00000002c0)=0x10) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@ipv4={[], [], @local}, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000540)=0x206a4173f725416b) 01:18:23 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x6, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000230000006a0a00fe000000008500000017000000b7000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0xffffffffffffff43}, 0x48) connect$pptp(0xffffffffffffffff, &(0x7f00000000c0)={0x18, 0x2, {0x4, @broadcast}}, 0x1e) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1000000, 0xe, 0xf9, &(0x7f00000001c0)="4ccd60e92def0e3dc9a181e5d4be", &(0x7f0000000440)=""/249, 0xf000}, 0x28) socketpair(0xf, 0x80800, 0xffff, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={r1, 0x10, &(0x7f00000003c0)={&(0x7f0000000340)=""/121, 0x79}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000600)={r1, 0x10, &(0x7f00000005c0)={&(0x7f0000000540)=""/100, 0x64}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={r1, 0x10, &(0x7f0000000640)={&(0x7f0000000300)=""/50, 0x2ca, 0xffffffffffffffff}}, 0xfffffe73) 01:18:23 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x460402}, 0xc, &(0x7f0000000180)={&(0x7f00000001c0)=@getae={0x0, 0x1f, 0x4, 0x70bd2a, 0x25dfdbfc, {{@in6=@remote, 0x4d5, 0x2}, @in=@multicast2}, [@address_filter={0x0, 0x1a, {@in=@rand_addr=0x8, @in, 0x2, 0x7, 0x3ff}}, @extra_flags={0x0, 0x18, 0xcc}]}, 0xfffffffffffffd03}, 0x1, 0x0, 0x0, 0xc0000}, 0x20004004) 01:18:23 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000000c0)) socket$inet6(0xa, 0x80006, 0x401) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)=""/62, 0x3e}}], 0x6de, 0x62, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48e01010}, 0xc, &(0x7f0000000100)={&(0x7f0000000b40)=@ipv4_newroute={0x24, 0x18, 0x714491aa34e726b1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@RTA_FLOW={0x8, 0xb, 0x272}]}, 0x21}}, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000000)}], 0x25f, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000080), 0x4) socket(0xb, 0x7, 0x6) 01:18:23 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000040)={0x88, 0x9, 0x7, 0xa30, 0x3, [{0x80, 0x80000000, 0xfffffffffffffffc}, {0x39, 0x9, 0x2, 0x0, 0x0, 0x1404}, {0x1, 0x8, 0x0, 0x0, 0x0, 0x80c}]}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x2) 01:18:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000003080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x20000000000002a, &(0x7f0000000040)=0x5, 0x4) sendmmsg(r0, &(0x7f000000d8c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)='#', 0x1}], 0x1}}], 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="72e3caf498182842"], 0x3) recvfrom(r1, &(0x7f0000003540)=""/68, 0x44, 0x10062, &(0x7f0000003640)=@hci, 0x707000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) 01:18:23 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) sendmmsg$nfc_llcp(r0, &(0x7f00000021c0)=[{&(0x7f0000000180)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e9695a229aa6ca6db7aa0287fb72a50f19de05cca4eae969ec755f718776b1086f0e99eee6c6f9618e21efedcc16ef5c5c015c3b5f5f45f4397b29673bd4f2"}, 0x60, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={0x10}, 0x10}], 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='io.stat\x00', 0x0, 0x0) bind$bt_rfcomm(r2, &(0x7f0000000540)={0x1f, {0x6, 0x400000000000, 0x9f, 0xfffffffffffffffa, 0x7, 0xaee7}, 0x3e8}, 0xa) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x4e24, 0x2, @remote, 0xf76f}, {0xa, 0x4e21, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x112e}, 0x2, [0x4, 0x1, 0x741e, 0x2, 0x6, 0xb5, 0x9, 0x9]}, 0x5c) 01:18:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000180)=0x80000000000001, 0x80) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='veno\x00', 0x5) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000040)={'yam0\x00', {0x2, 0x4e24, @multicast2}}) 01:18:23 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) ioctl(r0, 0x4, &(0x7f0000001580)="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") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x0, r1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x7, 0x7, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000180)='GPL\x00', 0x80000001, 0x1000, &(0x7f0000000400)=""/4096}, 0x48) [ 126.817404] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 01:18:23 executing program 5: r0 = socket$inet6_sctp(0xa, 0x2000000000000001, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x22, &(0x7f0000000080)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, &(0x7f0000000140)=0x84) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x8) 01:18:23 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2243e16d7220ac24f6972a50974ab19a7742fb7119021f07f34d9b29e41155f9937b7e21734055c69c431c97642d25a53f9d8a404fa177cd5f47ba49f4bf3f6e0335300cceb39d3cec98317bd911f60f9bc0c5883ff7330ef0d6c7ef39e9097ba9a0280ed6b40eea0cab4c17edf9ad78cc922b980022010f8891de2b9ecca0fec67b9ae6f55ff5ca2a0cd40863050a21013ad8a7f39e35383a984d00000000007340db67789883766abeeb8b46ac27a135e652432abfc6f9b3fa19279536990f4c47ad5cae949eec5d291dcb", @ANYRES16=r2, @ANYBLOB="19040000000000000000050000000c0001000800010000000000"], 0x20}}, 0x0) 01:18:23 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) sendmmsg$nfc_llcp(r0, &(0x7f00000021c0)=[{&(0x7f0000000180)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e9695a229aa6ca6db7aa0287fb72a50f19de05cca4eae969ec755f718776b1086f0e99eee6c6f9618e21efedcc16ef5c5c015c3b5f5f45f4397b29673bd4f2"}, 0x60, &(0x7f00000007c0), 0x0, &(0x7f0000000840)={0x10}, 0x10}], 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='io.stat\x00', 0x0, 0x0) bind$bt_rfcomm(r2, &(0x7f0000000540)={0x1f, {0x6, 0x400000000000, 0x9f, 0xfffffffffffffffa, 0x7, 0xaee7}, 0x3e8}, 0xa) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x4e24, 0x2, @remote, 0xf76f}, {0xa, 0x4e21, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x112e}, 0x2, [0x4, 0x1, 0x741e, 0x2, 0x6, 0xb5, 0x9, 0x9]}, 0x5c) 01:18:23 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='gretap0\x00', 0x10) recvmmsg(r0, &(0x7f0000004e00)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/174, 0xae}, {&(0x7f0000000300)=""/205, 0xcd}, {&(0x7f00000001c0)=""/116, 0x74}, {&(0x7f0000000400)=""/102, 0x66}, {&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/252, 0xfc}, {&(0x7f0000001680)=""/55, 0x37}], 0x8, &(0x7f0000001740)=""/158, 0x9e, 0x7ff}, 0x4}, {{&(0x7f0000001800)=@sco, 0x80, &(0x7f0000002a00)=[{&(0x7f0000001880)=""/4096, 0x1000}, {&(0x7f0000002880)=""/72, 0x48}, {&(0x7f0000002900)=""/201, 0xc9}], 0x3, &(0x7f0000002a40)=""/178, 0xb2, 0x8}, 0x200}, {{&(0x7f0000002b00)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}}}, 0x80, &(0x7f0000002e00)=[{&(0x7f0000002b80)=""/22, 0x16}, {&(0x7f0000002bc0)=""/215, 0xd7}, {&(0x7f0000002cc0)=""/62, 0x3e}, {&(0x7f0000002d00)=""/210, 0xd2}], 0x4, &(0x7f0000002e40)=""/195, 0xc3, 0xe00000000000}, 0xffffffffffffff15}, {{&(0x7f0000002f40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f00000031c0)=[{&(0x7f0000002fc0)=""/167, 0xa7}, {&(0x7f0000003080)=""/35, 0x23}, {&(0x7f00000030c0)=""/231, 0xe7}], 0x3, &(0x7f0000003200)=""/72, 0x48, 0x40}, 0x5}, {{&(0x7f0000003280)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003440)=[{&(0x7f0000003300)=""/11, 0xb}, {&(0x7f0000003340)=""/195, 0xc3}], 0x2, &(0x7f0000003480)=""/239, 0xef, 0x9}, 0x5}, {{&(0x7f0000003580)=@xdp, 0x80, &(0x7f0000003740)=[{&(0x7f0000003600)=""/7, 0x7}, {&(0x7f0000003640)=""/208, 0xd0}], 0x2, &(0x7f0000003780)=""/193, 0xc1, 0x9}, 0x6}, {{&(0x7f0000003880)=@alg, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003900)=""/198, 0xc6}, {&(0x7f0000003a00)=""/240, 0xf0}, {&(0x7f0000003b00)=""/178, 0xb2}, {&(0x7f0000003bc0)=""/138, 0x8a}, {&(0x7f0000003c80)=""/30, 0x1e}, {&(0x7f0000003cc0)=""/98, 0x62}, {&(0x7f0000003d40)=""/4096, 0x1000}, {&(0x7f0000004d40)=""/16, 0x10}], 0x8, 0x0, 0x0, 0x40}, 0xff}], 0x7, 0x2120, &(0x7f0000004fc0)={0x77359400}) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000005000)=0x2, &(0x7f0000005040)=0x1) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bind$llc(r0, &(0x7f0000000240), 0x10) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_POWER(r3, 0x112, 0x9, &(0x7f0000000000), &(0x7f0000000040)=0x1) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000005080)=0x1, 0x4) 01:18:23 executing program 5: r0 = socket$inet6(0x10, 0x100000003, 0x0) sendmsg(r0, &(0x7f0000000040)={&(0x7f0000000280)=@nl, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000400)="5500000018007fd500fe01b2a4a280930a06000000a84308910000003900080008000a0000dc1338d54400009b84136ef75afb83de448daa72540d816ed2c55327c43ab8220000060cec4fab91d400000000000000", 0x55}], 0x1, &(0x7f0000000100)}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000300)={0x4, 0x0, 0x4e, 0x7, 0x0}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000380)={0x80000001, 0xfffffffffffffbff, 0x1, 0x1f, 0x4, 0x0, 0x200, 0x3, r2}, 0x20) r3 = accept(r0, &(0x7f0000000100)=@hci, &(0x7f0000000000)=0x80) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000000180)={'raw\x00'}, &(0x7f0000000200)=0x54) ioctl$sock_bt_bnep_BNEPCONNDEL(r3, 0x400442c9, &(0x7f0000000080)={0x8, @remote}) 01:18:23 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000080)={r2, 0x0, 0x800, 0x8, 0x1f}) sendfile(r2, r2, &(0x7f0000000040)=0xffd, 0x10a000000) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) 01:18:23 executing program 3: r0 = socket$inet6(0x10, 0x100000000000002, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000000)=@nl, 0x80, &(0x7f00000000c0)=[{&(0x7f000000dfaa)="5500000018007fbdb72d1cb2a4a280930a06000000a84308910000000900140003000500000000001900a30700000000000000dc1338d54400009b84136ef75afb83de448daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1, &(0x7f0000001100)}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000100)={'gretap0\x00', {0x2, 0x4e22, @local}}) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140), 0x10) 01:18:23 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_buf(r0, 0x29, 0x8000000039, &(0x7f0000000080)="d1020400005800200007000613f32e1c00ce5fe1b471985e", 0x18) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000040), &(0x7f00000000c0)=0x4) sendto$inet6(r0, &(0x7f0000000240)="dc", 0x1, 0xffffd, &(0x7f0000aa9000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) 01:18:23 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000080)={0x6, 0x10, 0x6, 0x4000000000004, 0x1}) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001280)={0x0, 0x0, 0x100002, 0x20800002}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x100008, 0x40000000}) sendto$inet6(r1, &(0x7f00000001c0)="40ec73fffb69727c8d69f671d7547c06c334c6021b9b58e56b11489ff8df2a45774b48a87e29b460853fdd65acc7215e7aa6648358ee0d185f8cc74deb033b33a624d0226f990dd7d5233e436829c29f4c8f7f3fdf30e2309b73d9edace62c22a8109a682b9265bc9a908a06e75c455d829c6bf9dc3ff098fddca64d4c44c39ef3964ac7b988a424767d2a80e6c273d97324e4e128f6266cbbfda9506c86e63bdeaa598f5730caf936e5c9e40c4f63c8e0bcf0f45667a4e19c2d4259217fd0d8ea9618c18c7b5bb849dd9b3503fa6598db559c4b8080896210c551d528ebad", 0xdf, 0x20008000, 0x0, 0x0) [ 127.134194] netlink: 'syz-executor3': attribute type 20 has an invalid length. [ 127.160159] netlink: 17 bytes leftover after parsing attributes in process `syz-executor3'. 01:18:23 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$int_out(r0, 0x5460, &(0x7f0000000200)) accept4(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, &(0x7f00000000c0)=0x80, 0x80000) connect$bt_l2cap(r1, &(0x7f0000000140)={0x1f, 0x4, {0x1, 0x2, 0x1ff, 0x8000, 0x2, 0x8}, 0x5, 0x4}, 0xe) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f000001bfc8)={&(0x7f0000db4000), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8}]}, 0x30}}, 0x0) [ 127.185018] netlink: 'syz-executor3': attribute type 20 has an invalid length. 01:18:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x8, &(0x7f00000002c0)=0xffff7ffffffffffd, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x8, @dev={0xfe, 0x80, [], 0x16}, 0x9}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, &(0x7f0000000300)="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", 0x218, 0x8000, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) [ 127.225683] netlink: 17 bytes leftover after parsing attributes in process `syz-executor3'. 01:18:23 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) getpeername(r0, &(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000280)=0x80) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000100)=""/121, &(0x7f0000000180)=0x79) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000208070c1dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0xfffffcf7}], 0x1}, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x78) [ 127.280473] netlink: 'syz-executor0': attribute type 39 has an invalid length. 01:18:23 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000400)=ANY=[@ANYBLOB="240000001800210000000000000002001c1400ec0f00000100ff0f000800120002000000509377512909edd82a9346cc8adcc4c39cb1d8617c0bad38e2c363138d23652e1561c8274103939e696500002000000000000000"], 0x24}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000003c0)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000140)={{{@in=@multicast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000280)={{{@in=@broadcast, @in=@dev={0xac, 0x14, 0x14, 0x1b}, 0x4e22, 0x5, 0x4e21, 0x0, 0xa, 0x80, 0xa0, 0x5c, r1, r2}, {0x4, 0x13a, 0x4, 0x200, 0x3, 0x2f, 0x6, 0x2}, {0x3, 0x9, 0x8, 0x40}, 0x0, 0x6e6bbf, 0x1, 0x0, 0x1, 0x1}, {{@in6=@ipv4, 0x4d3, 0xff}, 0xa, @in6=@mcast1, 0x0, 0x3, 0x0, 0x101, 0x3, 0x80000000, 0x1}}, 0xe8) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f0000000100)=0xfffffffffffffe73) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x637, {0x8, 0xffff, 0xffffffffffffa915, 0x40, 0xffffffffffffff00, 0x3}, 0x10000, 0x8}, 0xe) [ 127.326823] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 01:18:23 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000280)='irlan0\x00') setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000003c0), 0x8) r1 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0xff}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={r2, @in6={{0xa, 0x4e20, 0x2, @local, 0x3}}, 0x81, 0x1}, 0x90) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r3, &(0x7f0000000240)='io.stat\x00', 0x0, 0x0) sendmmsg(r1, &(0x7f00000092c0), 0x0, 0xffffffffffffffff) socket$rds(0x15, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 01:18:23 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x894, 0x8}, 0x2c) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000b40)={'vcan0\x00'}) socketpair(0x7, 0x7, 0x4, &(0x7f0000004740)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = accept(0xffffffffffffff9c, &(0x7f0000004a40)=@rc, &(0x7f0000004ac0)=0x80) getsockopt$inet6_mreq(r3, 0x29, 0x20, &(0x7f0000004780)={@dev, 0x0}, &(0x7f00000047c0)=0xffffffbf) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000044000000000000000001000085000000360009000000000000000000181a0000942a279737c210b2b8d168af44e4f2f1581dbdf390eb3c271b60b08166cb2e628c988da0ef81b7f06d300e5c01a66b758630007ae1dfc9d0df1d1307fe9217f7f49a2299db8c101526cce72316faeefd49dabef9408cf92b90bb68684a", @ANYRES32=r0, @ANYBLOB="000000000000a200f7660600101d0000007d928ef7c208df5c00000000000000"], &(0x7f0000000cc0)='syzkaller\x00', 0x0, 0xfffffffffffffd05, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], r4, 0xb}, 0x48) r6 = openat$cgroup_ro(r2, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={0x0, r5, 0xb}, 0x14) getsockopt$inet_sctp6_SCTP_INITMSG(r6, 0x84, 0x2, &(0x7f00000002c0), &(0x7f0000000300)=0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000001c0)=[@in={0x2, 0x4e24, @multicast2}, @in6={0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0x19}, 0xfffffffffffffffe}, @in6={0xa, 0x4e24, 0x1, @empty, 0xffffffffffffff53}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x10}}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xf}}, @in={0x2, 0x4e21, @multicast2}], 0x88) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000180)={r7, 0x1, 0x8, 0x9}, 0x10) 01:18:23 executing program 3: r0 = socket$inet(0x2, 0x2, 0x3) r1 = accept(0xffffffffffffffff, &(0x7f0000000100)=@hci={0x1f, 0x0}, &(0x7f0000000000)=0x80) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x14}, @local, r2}, 0xc) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r4, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r5 = socket(0xa, 0x1, 0x0) getsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f00000002c0)=0x7, 0x4) setsockopt$inet_MCAST_JOIN_GROUP(r5, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c832, 0xffffffffffffffff, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x29, &(0x7f0000000600)=ANY=[@ANYBLOB="4f60d783000000000000390000000000"], 0x10) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000200)={{0xa, 0x4e20, 0x800, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}, 0x6}, {0xa, 0x4e23, 0x6, @mcast2}, 0x80, [0x8, 0x80000001, 0x330000000000, 0x7, 0x6, 0xec, 0x9, 0xb4c]}, 0x5c) 01:18:24 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x9, 0x4000000000080, 0x7}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000fcbfff), &(0x7f00000000c0)}, 0x20) r1 = accept4(0xffffffffffffff9c, &(0x7f0000000100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x80, 0x7093ceae86f33bbc) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000200)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r0, &(0x7f00000000c0)='r', &(0x7f0000000000)=""/36}, 0x18) 01:18:24 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) connect(r0, &(0x7f0000000180)=@generic={0x0, "73a41d346328093396d7f550e77c78434cff4a7e690245cced9bb66f8add2f0ba37cc1bb26aa49ee899ca8f2ace300f3d8224674070f76e6eab146136e04e46ae49712968a871f44860c7a5ee0443e54237ad5a07bb4d3aebc1d7cd69866fef83d3683b7b5a0b3ef3035d6084f6fb81c2da783a726c61c52f38d27d43dc6"}, 0x80) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000080), 0xe) bind$bt_l2cap(r0, &(0x7f0000000040), 0xe) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) listen(r0, 0x0) 01:18:24 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000080)={0x6, 0x10, 0x6, 0x4000000000004, 0x1}) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001280)={0x0, 0x0, 0x100002, 0x20800002}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x100008, 0x40000000}) sendto$inet6(r1, &(0x7f00000001c0)="40ec73fffb69727c8d69f671d7547c06c334c6021b9b58e56b11489ff8df2a45774b48a87e29b460853fdd65acc7215e7aa6648358ee0d185f8cc74deb033b33a624d0226f990dd7d5233e436829c29f4c8f7f3fdf30e2309b73d9edace62c22a8109a682b9265bc9a908a06e75c455d829c6bf9dc3ff098fddca64d4c44c39ef3964ac7b988a424767d2a80e6c273d97324e4e128f6266cbbfda9506c86e63bdeaa598f5730caf936e5c9e40c4f63c8e0bcf0f45667a4e19c2d4259217fd0d8ea9618c18c7b5bb849dd9b3503fa6598db559c4b8080896210c551d528ebad", 0xdf, 0x20008000, 0x0, 0x0) 01:18:24 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000080)={0x6, 0x10, 0x6, 0x4000000000004, 0x1}) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001280)={0x0, 0x0, 0x100002, 0x20800002}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x100008, 0x40000000}) sendto$inet6(r1, &(0x7f00000001c0)="40ec73fffb69727c8d69f671d7547c06c334c6021b9b58e56b11489ff8df2a45774b48a87e29b460853fdd65acc7215e7aa6648358ee0d185f8cc74deb033b33a624d0226f990dd7d5233e436829c29f4c8f7f3fdf30e2309b73d9edace62c22a8109a682b9265bc9a908a06e75c455d829c6bf9dc3ff098fddca64d4c44c39ef3964ac7b988a424767d2a80e6c273d97324e4e128f6266cbbfda9506c86e63bdeaa598f5730caf936e5c9e40c4f63c8e0bcf0f45667a4e19c2d4259217fd0d8ea9618c18c7b5bb849dd9b3503fa6598db559c4b8080896210c551d528ebad", 0xdf, 0x20008000, 0x0, 0x0) 01:18:24 executing program 4: socketpair(0x5, 0x80003, 0x80000000000, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$packet(r0, &(0x7f0000000380), &(0x7f00000003c0)=0x14) r1 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair(0x1d, 0x2, 0x36, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000180)=@sack_info={0x0, 0xfffffffffffffff7, 0x7}, &(0x7f00000001c0)=0xc) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f00000002c0)={r4, 0x85, "5302d37ba3b1df842ada0847e9e43fcf8e1ab5f4fb635e2ac7b9579fe673d398097dae99b161ff612b4b2117fbb4c71fd6dc0afdb0d62de1903e7a2b2814e6cb0318e8a6a74a3d0a6641acfa3a5f96f15bb8e5b44d8c792876672711ec0cc0641ebc026a77c72a15ac7bd5d65282fbbb32725f03c32ed58a183c105f35b17ba980dc71d71f"}, &(0x7f0000000200)=0x8d) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000000)=0x1, 0x4) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r5, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r5, &(0x7f0000000300)=ANY=[], 0xfe7c) getsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000400), &(0x7f0000000440)=0x4) write$binfmt_elf32(r5, &(0x7f0000000140)=ANY=[], 0xffef) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000080)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000000c0)=0x24) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000100)={0xc, 0x4, 0x7, 0x4287, r6}, 0x10) r7 = accept4(r1, 0x0, &(0x7f0000000040), 0x0) shutdown(r7, 0x2) 01:18:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x320) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f00000003c0)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000240)='bond0\x00', 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000140)={r0}) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000180)=0x5, 0x4) sendmmsg(r0, &(0x7f0000006e40)=[{{&(0x7f0000000080)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)='-', 0x1}], 0x1, &(0x7f0000000400)}}], 0x1, 0x40) 01:18:24 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000100000000800450000300000000000019078ac2314bbac1414fd050090780000000042000000000072a03ab600b4ac1414aaac141400"], &(0x7f0000000040)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000001480)={0xffffffffffffffff}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000014c0), &(0x7f0000001500)=0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl(r1, 0x10001, &(0x7f00000000c0)="ceaf9704062eaafdbbf1ec3680360270588aff9bb1fa5bd24c6998b86f8c008817b046d0524491af5005878fd327741d1757e800342dc262ff63ba") accept4$inet(r1, 0x0, &(0x7f0000000000), 0x8000080800) 01:18:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x4, &(0x7f0000000040)=@raw=[@jmp={0x5, 0xfc, 0xa, 0xf, 0x4, 0x4}, @alu={0x7, 0x3ff, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xf}, 0x48) r1 = socket(0x10, 0xa, 0x1f) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f0000000280)={0x7, &(0x7f0000000180)=[{0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @local}]}) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c000000220029b9ce3a0000000000000400000008000c00", @ANYRES32=0x0], 0x1c}}, 0x0) 01:18:24 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x3, &(0x7f00000001c0)="15b3410ef8cafab06234489dd25d5c60706ad44305900e2b8273b2b119170024b358eb8f8a6a88cb8d8749bafe58bdd7d4f07bd00e54ef28726cf0c3b695004f712206509880968a79b0138e0363db08fad6935154777614f3753c0d75b283ce79e40175ace9b8d96fa70b273ee411") bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x8, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b7000000000001c3bfa30000000000006503000028feffff7a0af0fff8ffffff61a4f0ff00000000b7060000000000012d600300000000004706000001ed00002f030000000000006d460000000000006b0a00fe00000000850000002e000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) socketpair$inet6(0xa, 0x6, 0xffff, &(0x7f0000000080)) 01:18:24 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x10, 0x4, 0x2000000000000004, 0x1}, 0x2c) accept(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, &(0x7f0000000000)=0x80) getsockname$inet(r1, &(0x7f0000000140)={0x2, 0x0, @remote}, &(0x7f0000000180)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000080)}, 0x32f) 01:18:24 executing program 0: r0 = socket$inet6(0xa, 0x10000000080001, 0x10000) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 01:18:24 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000080)={0x6, 0x10, 0x6, 0x4000000000004, 0x1}) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001280)={0x0, 0x0, 0x100002, 0x20800002}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x100008, 0x40000000}) sendto$inet6(r1, &(0x7f00000001c0)="40ec73fffb69727c8d69f671d7547c06c334c6021b9b58e56b11489ff8df2a45774b48a87e29b460853fdd65acc7215e7aa6648358ee0d185f8cc74deb033b33a624d0226f990dd7d5233e436829c29f4c8f7f3fdf30e2309b73d9edace62c22a8109a682b9265bc9a908a06e75c455d829c6bf9dc3ff098fddca64d4c44c39ef3964ac7b988a424767d2a80e6c273d97324e4e128f6266cbbfda9506c86e63bdeaa598f5730caf936e5c9e40c4f63c8e0bcf0f45667a4e19c2d4259217fd0d8ea9618c18c7b5bb849dd9b3503fa6598db559c4b8080896210c551d528ebad", 0xdf, 0x20008000, 0x0, 0x0) 01:18:24 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000080)={0x6, 0x10, 0x6, 0x4000000000004, 0x1}) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001280)={0x0, 0x0, 0x100002, 0x20800002}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x100008, 0x40000000}) sendto$inet6(r1, &(0x7f00000001c0)="40ec73fffb69727c8d69f671d7547c06c334c6021b9b58e56b11489ff8df2a45774b48a87e29b460853fdd65acc7215e7aa6648358ee0d185f8cc74deb033b33a624d0226f990dd7d5233e436829c29f4c8f7f3fdf30e2309b73d9edace62c22a8109a682b9265bc9a908a06e75c455d829c6bf9dc3ff098fddca64d4c44c39ef3964ac7b988a424767d2a80e6c273d97324e4e128f6266cbbfda9506c86e63bdeaa598f5730caf936e5c9e40c4f63c8e0bcf0f45667a4e19c2d4259217fd0d8ea9618c18c7b5bb849dd9b3503fa6598db559c4b8080896210c551d528ebad", 0xdf, 0x20008000, 0x0, 0x0) 01:18:24 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001200)={&(0x7f0000000080)=@can, 0x80, &(0x7f0000001100), 0x0, &(0x7f0000001140)=""/129, 0x81, 0x1}, 0x2002) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendmmsg(r0, &(0x7f0000000080), 0x4000000000001da, 0x0) 01:18:24 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x4, 0x0) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) listen(r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) connect$llc(r0, &(0x7f0000000300)={0x1a, 0x104, 0x356ea931, 0x4, 0x7, 0x1, @random="3c0932b9f8e5"}, 0x10) 01:18:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='team_slave_0\x00', 0x6) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000480)=0xe8) r2 = accept(r0, &(0x7f00000005c0)=@alg, &(0x7f0000000640)=0x80) sendmsg$can_raw(r2, &(0x7f0000000500)={&(0x7f0000000580)={0x1d, r1}, 0x10, &(0x7f0000000540)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x255}}, 0x4000000) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000240)) sendto$inet(r0, &(0x7f0000000300)="85", 0x1, 0x4000000, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@dev, @in=@multicast2}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000000080)=0xe8) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x2, 0x4) [ 128.142763] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 01:18:24 executing program 0: syz_emit_ethernet(0xffffffffffffff67, &(0x7f0000000140)={@broadcast, @random="68b921164ea4", [{[], {0x8100, 0x84, 0x7f}}], {@mpls_uc={0x8847, {[{0x7ff, 0x8001, 0x8, 0x200}], @ipv6={0x740, 0x6, '&XZ', 0x0, 0x3c, 0x2, @loopback, @mcast1, {[@hopopts={0xff, 0x0, [], [@padn={0x1, 0x0, [0x0, 0x0]}, @padn={0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x4}, @hao={0xc9, 0x0, @dev={0xfe, 0x80, [], 0x1d}}]}, @fragment={0x21, 0x0, 0x38d4, 0x978, 0x0, 0x7ff, 0x66}, @dstopts={0x88, 0x0, [], [@hao, @calipso={0x7, 0x0, {0x1, 0x0, 0x20, 0x7f, [0x8, 0x0, 0x5ba, 0x1, 0x3, 0xb037]}}, @enc_lim={0x4, 0x1, 0x5}]}, @hopopts={0x6, 0x0, [], [@jumbo={0xc2, 0x4, 0x9}, @ra={0x5, 0x2, 0x4}]}, @dstopts={0x0, 0x0, [], [@padn={0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x0, [0x0, 0x0]}, @hao={0xc9, 0x0, @ipv4={[], [], @broadcast}}]}], @gre={{0x0, 0x0, 0x1, 0xfffffffffffffffa, 0x0, 0x200, 0x0, 0x1, 0x880b, 0x0, 0x2, [0x6], "4bd91fa468d74d6481f22a109fdc36f374b75138dac0a0ff35bac5f47a4360e9f3850acf603e1e149b"}, {0x81, 0x0, 0x7c, 0x80000001, 0x0, 0x0, 0x800, [0x7, 0x10001], "c1f276bce6932fd0754236d57650ff5cafa23902f229beb835d6e99a59242bc2d2b630c278268cd7becf2781ae82968a5b437d87d5a0134d347e02a61c05a6481edba7cc9e078a45cbcdc969eb72a00277f63b55917a4a8667a841e7bacc60ad4a023f957ec02c64ab04fe079d18b71fda6a"}, {0x5, 0x0, 0x7, 0x101, 0x0, 0x0, 0x86dd, [0x7], "09e70bb883012d6166979e61437354e2df6468cd61643ab08c7d6b01f31e8c3cf2d5a8d3ac5fc657857b10f069aa900d96e3b20cf988be6e055bd16a22b744be94b77523a24d7dfbe7cf7525c5020eb079feecd2a0d0bcc15ffaf17a71a40c3ec8a3159b5974c17ea5fa3988073badc64531217293af2d5d3b8006a042a931f710fc7cf3aabec48af8d3a848954c40d01393017d333109ba265a7c4c42a989ad3e4c5fb8977d4350545b3ec367993c5d1fcfc1e4ed3d1ffed65661e86a51e1547d194fa2026b425d00056c353a7357cd87ac4eff87b8f71bbbaba5c1f0f6325738"}, {0x8, 0x88be, 0x1, {{0x5, 0x1, 0x31f37991, 0x100, 0x5, 0xfffffffffffffc01, 0x5, 0x4}, 0x1, 0x800}}, {0x8, 0x22eb, 0x4, {{0x100000000, 0x2, 0x6, 0x2, 0x64fc, 0xffffffff, 0x0, 0x3}, 0x2, 0x40b, 0x456, 0x4, 0x8, 0x5524, 0x4, 0x5f4, 0x101, 0x400}}, {0x8, 0x6558, 0x2, "54866c16b554ad8a7b46f83045a4"}}}}}}}}, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bind$bt_sco(r3, &(0x7f0000000580)={0x1f, {0x401, 0x2, 0x0, 0x10000, 0x5, 0x81}}, 0x8) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x40, r4, 0x820, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x36d}, @IPVS_CMD_ATTR_SERVICE={0x10, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000040}, 0x90) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) bind$bt_sco(r1, &(0x7f0000000140), 0x8) connect$vsock_dgram(r2, &(0x7f00000005c0)={0x28, 0x0, 0x2710, @my=0x1}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000080)={0xec0, {{0x2, 0x1, @loopback}}}, 0x88) 01:18:24 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001200)={&(0x7f0000000080)=@can, 0x80, &(0x7f0000001100), 0x0, &(0x7f0000001140)=""/129, 0x81, 0x1}, 0x2002) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendmmsg(r0, &(0x7f0000000080), 0x4000000000001da, 0x0) 01:18:24 executing program 5: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f00000001c0)={0xb11, 0x0, 0x0, 0x4}, 0x8) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000380)="0a8e4e4c05b92c399db3") setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000100), 0x4) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000080), 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_type(r3, &(0x7f0000001340)='threaded\x00', 0xfffffd63) setsockopt$inet_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f0000000240)={0x97}, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e20, @local}}, 0x1, 0x6, 0x9, 0xffff, 0x20}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000340)={r4}, 0x8) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2}) getsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000280), &(0x7f0000000300)=0x8) ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f00000002c0)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140), 0x4) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000180)=0x4, 0x1) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f00000003c0)={r1, 0x0, 0x338, 0x3, 0x1f}) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000440), &(0x7f0000000480)=0x4) close(r3) syz_emit_ethernet(0x1a, &(0x7f0000000080)={@link_local, @remote, [], {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @empty, @remote, @empty, @mcast2}}}}, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f00000004c0)=[@in={0x2, 0x4e21, @rand_addr=0x1000}, @in6={0xa, 0x4e22, 0x6f6, @mcast1, 0xfff}, @in6={0xa, 0x4e23, 0x800, @local, 0xfc2}, @in6={0xa, 0x4e20, 0x8000, @local, 0x7f}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e21, 0x6}], 0x90) 01:18:24 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8910, &(0x7f0000000080)=@req={0x28, &(0x7f0000000000)={'veth1\x00', @ifru_hwaddr=@random="d4ca8a17f7cd"}}) sendto$llc(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000040)={0x1a, 0x100, 0x8, 0x9fb, 0x1, 0x1, @dev={[], 0xa}}, 0x10) syz_init_net_socket$llc(0x1a, 0x3, 0x0) close(r0) socket$netlink(0x10, 0x3, 0x1f) socket$bt_rfcomm(0x1f, 0x3, 0x3) 01:18:24 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000080)={0x6, 0x10, 0x6, 0x4000000000004, 0x1}) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001280)={0x0, 0x0, 0x100002, 0x20800002}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x100008, 0x40000000}) sendto$inet6(r1, &(0x7f00000001c0)="40ec73fffb69727c8d69f671d7547c06c334c6021b9b58e56b11489ff8df2a45774b48a87e29b460853fdd65acc7215e7aa6648358ee0d185f8cc74deb033b33a624d0226f990dd7d5233e436829c29f4c8f7f3fdf30e2309b73d9edace62c22a8109a682b9265bc9a908a06e75c455d829c6bf9dc3ff098fddca64d4c44c39ef3964ac7b988a424767d2a80e6c273d97324e4e128f6266cbbfda9506c86e63bdeaa598f5730caf936e5c9e40c4f63c8e0bcf0f45667a4e19c2d4259217fd0d8ea9618c18c7b5bb849dd9b3503fa6598db559c4b8080896210c551d528ebad", 0xdf, 0x20008000, 0x0, 0x0) 01:18:24 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000080)={0x6, 0x10, 0x6, 0x4000000000004, 0x1}) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001280)={0x0, 0x0, 0x100002, 0x20800002}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x100008, 0x40000000}) sendto$inet6(r1, &(0x7f00000001c0)="40ec73fffb69727c8d69f671d7547c06c334c6021b9b58e56b11489ff8df2a45774b48a87e29b460853fdd65acc7215e7aa6648358ee0d185f8cc74deb033b33a624d0226f990dd7d5233e436829c29f4c8f7f3fdf30e2309b73d9edace62c22a8109a682b9265bc9a908a06e75c455d829c6bf9dc3ff098fddca64d4c44c39ef3964ac7b988a424767d2a80e6c273d97324e4e128f6266cbbfda9506c86e63bdeaa598f5730caf936e5c9e40c4f63c8e0bcf0f45667a4e19c2d4259217fd0d8ea9618c18c7b5bb849dd9b3503fa6598db559c4b8080896210c551d528ebad", 0xdf, 0x20008000, 0x0, 0x0) 01:18:24 executing program 5: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x10, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/119, 0x77}, {&(0x7f0000000080)=""/226, 0xe2}, {&(0x7f0000000300)=""/4096, 0x1000}], 0x3, &(0x7f0000001300)=""/4096, 0x1000, 0x101}, 0x20) getsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000002c0), &(0x7f0000002600)=0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) 01:18:25 executing program 3: r0 = socket$inet(0x2, 0x0, 0x8000000000000000) getsockname(r0, &(0x7f0000000100)=@pppol2tpv3, &(0x7f0000000180)=0x80) 01:18:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000018c0)={&(0x7f00000002c0), 0xc, &(0x7f0000001880)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c00000010001500000000000000000000000000", @ANYRES32=r1, @ANYBLOB="00000000000000000c000100ffff69886ca88a423bc57391bc5450aa5d8d4705a9f3d5e2efeb3724623cd73f91867a8f6ec1ec575a6e478eddf51cea691e23afdc6bf981a2c99a685b056c2012b80dbe6ed97cf4f8810fc4bbf722fc33309e860a14b53103e25b9115d3c4d216b55fafa3d95441522d33190777f0f00165bd5e7a55ba"], 0x2c}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000000)=0x79) 01:18:25 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000200006a0a00fe00000000850000000a000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = accept4(0xffffffffffffff9c, &(0x7f0000000080)=@ipx, &(0x7f0000000140)=0x80, 0x80800) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000014c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000180)=0x1008) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000280)={r2, 0x7fffffff}, 0x8) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000002c0)={'raw\x00'}, &(0x7f0000000480)=0x54) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x100000000000000, 0xe, 0xc5, &(0x7f0000000100)="5b573db513106eeb3e787f4995de", &(0x7f0000000380)=""/197}, 0x28) 01:18:25 executing program 2: r0 = socket(0x1e, 0x1, 0x0) bind(r0, &(0x7f0000000040)=@sco={0x1f, {0xffffffffebbd90bb, 0x1, 0x2, 0x1, 0xe1, 0x7}}, 0x80) bind(r0, &(0x7f0000afb000)=@generic={0x1e, "0103000000000000000000004700000000a979f321b30c7bc8790405c7bad62e0a63a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb3151d24acef1f1622ca5bdb9c8ea31000077aeb81c90001d6d7c980400000000f70dc136cb184a"}, 0x80) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @aes128, 0x3, "3d0af03ff0208acd"}) close(r0) 01:18:25 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x400000000201040}, 0xffffffbb) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x4, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000000), 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x5b, 0xec, &(0x7f0000000000)="3db8305104d4202073a5d59bebe15510a9d6fbf441aee53ca0343cb1f5c8d2c31c789ac1ea332c1ff40f2f19409082aa643b79ce1189f6e5d80b95183e6eb9bfb0c8ad45764a0fbd5b8deb67d22753bd043a5a417cb3f2b6628d14", &(0x7f0000000080)=""/236, 0x7fff}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001580)='cpu.stat\x00', 0x0, 0x0) recvfrom$llc(r1, &(0x7f00000015c0)=""/131, 0x83, 0x1, &(0x7f0000001680)={0x1a, 0x326, 0x5e5, 0x2d46, 0x0, 0x8001, @local}, 0x10) 01:18:25 executing program 0: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @remote}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00001edff0)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f000090bff7)="fb0c3eb633c37ea3a0", 0x9) setsockopt$inet_mreq(r1, 0x0, 0x20, &(0x7f0000000000)={@rand_addr, @local}, 0x8) sendto$inet(r1, &(0x7f0000e76000)="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", 0x5b5, 0x0, &(0x7f0000bc8ff0)={0x2, 0x4e20, @multicast1}, 0x10) 01:18:25 executing program 3: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080), 0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4e22, 0x3, @empty, 0x7}}, 0x4, 0x81, 0x8, 0x2, 0xfffffffffffff0a0}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x4, 0x7, 0x9, r2}, &(0x7f0000000580)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000002b80)={0x9, 0x0, 0xceea00, 0x40, r2}, 0x10) r4 = socket$inet(0x2, 0x1, 0x0) recvmmsg(r1, &(0x7f00000044c0)=[{{&(0x7f00000000c0)=@ax25, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/187, 0xbb}], 0x1, &(0x7f00000005c0)=""/4096, 0x1000, 0x80000001}, 0x7}, {{&(0x7f00000002c0)=@rc, 0x80, &(0x7f0000000340)=[{&(0x7f0000000180)=""/62, 0x3e}, {&(0x7f00000015c0)=""/208, 0xd0}, {&(0x7f00000016c0)=""/206, 0xce}, {&(0x7f00000017c0)=""/202, 0xca}, {&(0x7f00000018c0)=""/195, 0xc3}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x6, &(0x7f00000003c0)=""/39, 0x27, 0x2}, 0x2}, {{&(0x7f00000029c0)=@generic, 0x80, &(0x7f0000002b40)=[{&(0x7f0000002a40)=""/223, 0xdf}], 0x1, &(0x7f0000002b80), 0x0, 0x5}, 0x8}, {{&(0x7f0000002bc0)=@ax25, 0x80, &(0x7f0000002dc0)=[{&(0x7f0000002c40)=""/222, 0xde}, {&(0x7f0000002d40)=""/103, 0x67}], 0x2, 0x0, 0x0, 0x4}, 0x1}, {{0x0, 0x0, &(0x7f0000004340)=[{&(0x7f0000002e00)=""/58, 0x3a}, {&(0x7f0000002e40)=""/108, 0x6c}, {&(0x7f0000002ec0)=""/181, 0xb5}, {&(0x7f0000002f80)=""/126, 0x7e}, {&(0x7f0000003000)=""/154, 0x9a}, {&(0x7f00000030c0)=""/113, 0x71}, {&(0x7f0000003140)=""/235, 0xeb}, {&(0x7f0000003240)=""/4096, 0x1000}, {&(0x7f0000004240)=""/121, 0x79}, {&(0x7f00000042c0)=""/80, 0x50}], 0xa, &(0x7f0000004400)=""/169, 0xa9, 0x1}, 0x227}], 0x5, 0x40, &(0x7f0000004600)) shutdown(r4, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000000)={r3, 0x2}, &(0x7f0000000040)=0x8) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f00000046c0), &(0x7f0000004700)=0x4) recvmmsg(r4, &(0x7f0000000200), 0x973, 0x0, &(0x7f0000007ac0)={0x0, r5+10000000}) listen(r4, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000004640)={r2, 0x6}, &(0x7f0000004680)=0x8) 01:18:25 executing program 2: r0 = socket(0x1e, 0x1, 0x0) bind(r0, &(0x7f0000000040)=@sco={0x1f, {0xffffffffebbd90bb, 0x1, 0x2, 0x1, 0xe1, 0x7}}, 0x80) bind(r0, &(0x7f0000afb000)=@generic={0x1e, "0103000000000000000000004700000000a979f321b30c7bc8790405c7bad62e0a63a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb3151d24acef1f1622ca5bdb9c8ea31000077aeb81c90001d6d7c980400000000f70dc136cb184a"}, 0x80) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @aes128, 0x3, "3d0af03ff0208acd"}) close(r0) 01:18:25 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffff9c, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r0, 0x2, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x37}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 01:18:25 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x110) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000000c0)={0x9, 0x0, 0x3, 0x0, 0x0, [{r0}, {r0, 0x0, 0xff}, {}]}) socketpair$inet6(0xa, 0x6, 0x3f, &(0x7f0000000000)) 01:18:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff02c}, {0x6}]}, 0x10) r1 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14, 0x800) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[{0x8, 0x4, 0x9, 0xfffffffffffff73a}, {0x12, 0x7, 0x0, 0x3}, {0x5, 0x1, 0x6, 0x8}, {0x401, 0x1, 0x6, 0x7}]}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000100)) 01:18:25 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x175, &(0x7f00000004c0)=ANY=[], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a7849d2f5910000362d4e"}, 0x10) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000280), &(0x7f00000002c0)=0x4) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000071101c0000000000000000000000000095000000000000001d31233557ef58d848c3c88ce71654b8efe3b178f1c913fee935cc326f23ae643e12165b92363bdf051b4ba74686558b7bbf42753d254b8d3dd2cfdbdf083ee1daacac06e1a77747405cdf13d4e6644463e5cab6f148f5230b10a03fc2461407976fe4691402aa3188217abaf6a8147f74eb2fa01e5c1e9dbc9fa509ee81634a8666d274c7d3f8a3f6838be9bc457ac49259468393c0fcc5fd66738ce2b73484a38b9646d485f14d2ce442e36e2b3932c022321cd85ea146c403d5af56261cbe3871ae84962127a055be94e1c13c019ef5e6f793edb3de3ea7"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) 01:18:25 executing program 2: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000), 0x4) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000000c0), 0x4) r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1}, 0x14) accept4$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14, 0x80000) sendmmsg$inet_sctp(r0, &(0x7f0000871fc8), 0x4924924924925d0, 0x0) 01:18:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000100)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000140)=0x100, 0xfd50) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000008c0)={r2}) connect$pppoe(r3, &(0x7f0000000900)={0x18, 0x0, {0x2, @remote, 'bridge_slave_1\x00'}}, 0x1e) sendto$inet6(r2, &(0x7f0000000300)="9b3328deb0c3e21be251ce8a756127ed775dfbf3e506708da297fbfa056db03c31d858396934667786e62693471882d04a9cc5c667eb4bcd78bb11c78d10484a0d835847ffb75795ef7145118f84dcf94600000000000000000000000000000200", 0xfffffffffffffe5a, 0x20000004, &(0x7f00000002c0)={0xa, 0x100000004e22, 0x0, @empty, 0x7}, 0x1c) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, &(0x7f0000000040)=0x6e, 0x80000) sendmmsg$unix(r4, &(0x7f0000000200), 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r2, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x3f000000, 0x1500]}}, 0x1c) accept(r4, &(0x7f0000000200)=@generic, &(0x7f0000000280)=0x80) close(r1) 01:18:25 executing program 5: r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000200)=0x10, 0x80000) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000240)) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0x4) socketpair(0x7, 0x1, 0x7f, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f00000002c0)=0xc) getsockopt$inet6_dccp_buf(r3, 0x21, 0xc, &(0x7f0000000080)=""/40, &(0x7f0000000100)=0x28) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) sendto$inet(r3, &(0x7f0000000140)="e8e40808f63aa9872c673b69a842bf5927e0ccfd091471535306b5ce61d6079b709453eed621958999806f0b47244c82aad325dfd1cb97b7b31302aa9ceaf9", 0x3f, 0x4, &(0x7f0000000180)={0x2, 0x4e21, @loopback}, 0x10) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 01:18:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff02c}, {0x6}]}, 0x10) r1 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14, 0x800) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[{0x8, 0x4, 0x9, 0xfffffffffffff73a}, {0x12, 0x7, 0x0, 0x3}, {0x5, 0x1, 0x6, 0x8}, {0x401, 0x1, 0x6, 0x7}]}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000100)) 01:18:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000380)="153f6234488dd25d766070") setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f00000000c0)=0x74, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000000)={&(0x7f0000000180), 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x18, 0x2d, 0x119, 0x0, 0x0, {0x2}, [@nested={0x4}]}, 0x18}}, 0x0) 01:18:25 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x801, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x2) [ 129.350787] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:18:25 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)="6d656d6f722a8ce0f03bd732be00", 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) [ 129.449938] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:18:26 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000040), 0x8) bind$bt_sco(r0, &(0x7f0000000000)={0x1f, {0x100000000, 0x3, 0x6, 0x5, 0x845, 0x1610}}, 0x8) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000140)=0x9, 0x9) 01:18:26 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={0xffffffffffffff9c}) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x58) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x24, &(0x7f0000000280)=0x1000000, 0x4) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000040)={'ipddp0\x00', {0x2, 0x4e23, @broadcast}}) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x2, @ipv4={[], [], @local}}, 0x1c) 01:18:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(rfc4106(gcm(aes)))\x00'}, 0x58) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000000)=0x5) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000000), 0x10) 01:18:26 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000100)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000140)=0x100, 0xfd50) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000008c0)={r2}) connect$pppoe(r3, &(0x7f0000000900)={0x18, 0x0, {0x2, @remote, 'bridge_slave_1\x00'}}, 0x1e) sendto$inet6(r2, &(0x7f0000000300)="9b3328deb0c3e21be251ce8a756127ed775dfbf3e506708da297fbfa056db03c31d858396934667786e62693471882d04a9cc5c667eb4bcd78bb11c78d10484a0d835847ffb75795ef7145118f84dcf94600000000000000000000000000000200", 0xfffffffffffffe5a, 0x20000004, &(0x7f00000002c0)={0xa, 0x100000004e22, 0x0, @empty, 0x7}, 0x1c) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, &(0x7f0000000040)=0x6e, 0x80000) sendmmsg$unix(r4, &(0x7f0000000200), 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r2, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x3f000000, 0x1500]}}, 0x1c) accept(r4, &(0x7f0000000200)=@generic, &(0x7f0000000280)=0x80) close(r1) 01:18:26 executing program 4: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0xfffffffffffffffd}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair(0x9, 0x80000, 0x1, &(0x7f0000000000)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)={0x40000000}) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) [ 129.621171] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 129.705718] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:18:26 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x2) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)="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", 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)="0100000000000000d571e2080544f060e8a8c4433e6570746800", 0x2, 0x0) sendfile(r2, r2, &(0x7f0000000140), 0x80001) 01:18:26 executing program 5: r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000200)=0x10, 0x80000) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000240)) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0x4) socketpair(0x7, 0x1, 0x7f, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f00000002c0)=0xc) getsockopt$inet6_dccp_buf(r3, 0x21, 0xc, &(0x7f0000000080)=""/40, &(0x7f0000000100)=0x28) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) sendto$inet(r3, &(0x7f0000000140)="e8e40808f63aa9872c673b69a842bf5927e0ccfd091471535306b5ce61d6079b709453eed621958999806f0b47244c82aad325dfd1cb97b7b31302aa9ceaf9", 0x3f, 0x4, &(0x7f0000000180)={0x2, 0x4e21, @loopback}, 0x10) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 01:18:26 executing program 3: openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000100), &(0x7f0000000140)=0xc) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000040)={0x0, 0xfffffffffffffffe}) 01:18:26 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000380)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000080), 0x9) getsockopt$inet6_udp_int(r2, 0x11, 0x6f, &(0x7f0000000040), &(0x7f0000000100)=0x4) 01:18:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(rfc4106(gcm(aes)))\x00'}, 0x58) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000000)=0x5) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000000), 0x10) 01:18:26 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000100)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000140)=0x100, 0xfd50) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000008c0)={r2}) connect$pppoe(r3, &(0x7f0000000900)={0x18, 0x0, {0x2, @remote, 'bridge_slave_1\x00'}}, 0x1e) sendto$inet6(r2, &(0x7f0000000300)="9b3328deb0c3e21be251ce8a756127ed775dfbf3e506708da297fbfa056db03c31d858396934667786e62693471882d04a9cc5c667eb4bcd78bb11c78d10484a0d835847ffb75795ef7145118f84dcf94600000000000000000000000000000200", 0xfffffffffffffe5a, 0x20000004, &(0x7f00000002c0)={0xa, 0x100000004e22, 0x0, @empty, 0x7}, 0x1c) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, &(0x7f0000000040)=0x6e, 0x80000) sendmmsg$unix(r4, &(0x7f0000000200), 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r2, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x3f000000, 0x1500]}}, 0x1c) accept(r4, &(0x7f0000000200)=@generic, &(0x7f0000000280)=0x80) close(r1) 01:18:26 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x800000000002) ioctl(r0, 0x8912, &(0x7f0000000040)="153f62344885d25d766070") r1 = socket(0x200000000000011, 0x4000000000080002, 0x0) setsockopt$sock_int(r1, 0x1, 0x29, &(0x7f0000000040)=0x8, 0x4) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f00000011c0)={'filter\x00', 0x0, 0x4, 0x1000, [], 0x9, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000001c0)=""/4096}, &(0x7f0000000000)=0x78) sendmmsg$inet_sctp(r1, &(0x7f00000000c0)=[{&(0x7f000086c000)=@in6={0xa, 0x0, 0x2}, 0x1c, &(0x7f0000000100), 0x0, &(0x7f0000000000)}], 0x1, 0x0) 01:18:26 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x54) r1 = socket$xdp(0x2c, 0x3, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000000c0)='cpuacct.usage_user\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x8) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0x5f) 01:18:26 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000002c0)="153f6234488dd25d766070") setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000f59000), 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e20, @local}, 0x10) r2 = socket(0x9, 0x5, 0x8000) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f00000000c0)=0x3, 0x4) socket(0xbd7d57f4887cd92f, 0x3, 0x6) r3 = socket$inet6(0xa, 0x80003, 0x800020000000007) ioctl(r3, 0x8912, &(0x7f0000000500)="152a6210aea8fcaea4c7658b0f6648f3c9035530a822e19936d3e94a5a6b67211e8d113d3e67480d31e429c42fd3ae3a5d269ee29917b89474f5252b8ed0ebbca58e6be3498e7864ce60bdf2aaaeb4c8fddbaeeacc255450f7b7c1ca4b8324646d8e7b6a8439f3c1b2abb84174ca974b19bb25b95e860548ca2dda27198527ce60ba064d8c7d938ff3e160ecb561f81096ab971e16267f9e422d6638a30c70665d782b05964c312acc3b55cb07cf51f2996e28ee6907f4cfa05b52") connect$inet(r1, &(0x7f0000ccb000)={0x2, 0x4e23}, 0x10) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000080)=0x400) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000140), 0x8) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000038b03c20000000000000000000000f500000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r5 = socket$kcm(0x29, 0x5, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRES64], 0x4e4) recvfrom$packet(r2, &(0x7f00000005c0)=""/253, 0xfd, 0x2003, &(0x7f0000000400)={0x11, 0x8, 0x0, 0x1, 0x2, 0x6, @remote}, 0x14) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000000)={r1, r4}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000180)={0x3, 0x8, 0x0, 0x9, 0x4}, 0x14) recvmmsg(r5, &(0x7f0000006400)=[{{&(0x7f0000001f00)=@can, 0x80, &(0x7f0000002140)=[{&(0x7f0000001f80)=""/58, 0x3a}], 0x1, &(0x7f0000002180)=""/88, 0x58}}], 0x500, 0x0, &(0x7f00000065c0)={0x0, r6+30000000}) 01:18:26 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') readv(r1, &(0x7f0000000240), 0x1) sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f00000005c0)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000600)={0x14}, 0x14}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0501000000000000000001000000080001003477db0e1f8c1785dee3a1af43a7c4fadc8d8e283ccae8630aa3ee753ef516079e847f8bb18b7f3da76724989d78d80cee36b62790e53987c916a9f150e9682054e64dbabdef63193ee8134896885cc017386915e5d4518075ce4a2346dc20002995a886cd3f22fb5de21afbafdd101dbaf8c9e999d8f33011c4485a81d41085dd4582450384cb68f0b538a64053d88a", @ANYRES32=0x0, @ANYBLOB="04000200"], 0x20}}, 0x0) 01:18:26 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="1300000043001f0014f9f407040874af1e59a1", 0xffffff5b) recvfrom$llc(r0, &(0x7f0000000040)=""/34, 0x22, 0x100, &(0x7f00000000c0)={0x1a, 0x33f, 0x8, 0x1, 0x200, 0xbea, @random="621115644b1e"}, 0x10) [ 130.029159] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 130.067960] netlink: 4 bytes leftover after parsing attributes in process `syz-executor5'. 01:18:26 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xad, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392d450ff1fb635a5849d20600000000000000e1"}, 0x10) socketpair(0xb, 0x1, 0x6d, &(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f00000025c0)={'filter\x00', 0x7, 0x4, 0x480, 0x280, 0x280, 0x280, 0x398, 0x398, 0x398, 0x4, &(0x7f0000002580), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @empty, @dev={0xac, 0x14, 0x14, 0x10}, @loopback, 0x9, 0x1}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="f1ec10cfd028", @empty, @broadcast, @dev={0xac, 0x14, 0x14, 0x16}, 0x6, 0xffffffff}}}, {{@arp={@broadcast, @broadcast, 0xffffff00, 0xffffff00, @empty, {[0xff, 0x0, 0x0, 0x0, 0x4259445223571ef5, 0xff]}, @mac=@local, {[0xff, 0x0, 0xff, 0xff, 0x0, 0xff]}, 0x1, 0x8, 0x2, 0x6, 0x9, 0x2, 'rose0\x00', 'veth0\x00', {}, {}, 0x0, 0x64}, 0xf0, 0x118}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x14b, 0xfffffffffffffffc}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4d0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x38, &(0x7f00000000c0)}, 0x10) [ 130.087600] netlink: 4 bytes leftover after parsing attributes in process `syz-executor5'. 01:18:26 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000004300)={&(0x7f0000000180), 0xc, &(0x7f00000042c0)={&(0x7f0000004340)=ANY=[@ANYBLOB="300000002d000100000000000000000000000000", @ANYRES32=r1, @ANYBLOB="000000000000000008001b00000000000800160004000100"], 0x30}}, 0x0) getsockopt$netlink(r0, 0x10e, 0xf, &(0x7f0000000000)=""/232, &(0x7f0000000100)=0xe8) 01:18:26 executing program 5: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f00000000c0)="1f0000000104ff00fd4354c007110000f3050100080001000158be6571567c", 0x16) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000100)={0x0, 0x1, "c2"}, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={r1, 0x68, &(0x7f0000000140)=[@in={0x2, 0x4e21, @multicast2}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e21, 0xfffffffffffff001, @dev={0xfe, 0x80, [], 0x1b}, 0x20}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e23, 0x10001, @empty, 0x10000}]}, &(0x7f0000000200)=0x10) write(r0, &(0x7f0000000040)="1f0000000104fffffd3b9ec007110090090501000b000200000010d10200cf", 0x1f) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x100, 0x4) 01:18:26 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x20, 0x400, 0x40, 0x9, 0x8, 0x5, 0x7fff, 0x8001, 0x3fe0000000000, 0x2, 0x100000000}, 0xb) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/2, 0x121e001, 0x800}, 0x18) setsockopt$XDP_RX_RING(r0, 0x11b, 0x3, &(0x7f0000000100)=0x2, 0x4) [ 130.205996] netlink: 12 bytes leftover after parsing attributes in process `syz-executor3'. 01:18:26 executing program 5: clock_gettime(0x7, &(0x7f0000000000)) ppoll(&(0x7f0000000100), 0xc, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0)={0x4}, 0xffffffffffffff7d) [ 130.260149] netlink: 12 bytes leftover after parsing attributes in process `syz-executor3'. 01:18:26 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000004300)={&(0x7f0000000180), 0xc, &(0x7f00000042c0)={&(0x7f0000004340)=ANY=[@ANYBLOB="300000002d000100000000000000000000000000", @ANYRES32=r1, @ANYBLOB="000000000000000008001b00000000000800160004000100"], 0x30}}, 0x0) getsockopt$netlink(r0, 0x10e, 0xf, &(0x7f0000000000)=""/232, &(0x7f0000000100)=0xe8) [ 130.373567] netlink: 12 bytes leftover after parsing attributes in process `syz-executor3'. [ 130.409253] ================================================================== [ 130.416888] BUG: KASAN: use-after-free in tcf_block_find+0x9d1/0xb90 [ 130.423418] Read of size 4 at addr ffff8801c6db1238 by task syz-executor3/7424 [ 130.430795] [ 130.432669] CPU: 0 PID: 7424 Comm: syz-executor3 Not tainted 4.19.0-rc5+ #239 [ 130.439961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 130.449324] Call Trace: [ 130.451929] dump_stack+0x1c4/0x2b4 [ 130.455572] ? dump_stack_print_info.cold.2+0x52/0x52 [ 130.460765] ? printk+0xa7/0xcf [ 130.460801] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 130.460826] print_address_description.cold.8+0x9/0x1ff [ 130.460844] kasan_report.cold.9+0x242/0x309 [ 130.460859] ? tcf_block_find+0x9d1/0xb90 [ 130.460879] __asan_report_load4_noabort+0x14/0x20 [ 130.460892] tcf_block_find+0x9d1/0xb90 [ 130.460909] tc_del_tfilter+0x42b/0x1290 [ 130.460932] ? tc_get_tfilter+0xa90/0xa90 [ 130.460950] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 130.505604] ? check_preemption_disabled+0x48/0x200 [ 130.510650] ? check_preemption_disabled+0x48/0x200 [ 130.515680] ? __lock_is_held+0xb5/0x140 [ 130.519737] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 130.525267] ? rtnl_get_link+0x170/0x370 [ 130.529328] ? tc_get_tfilter+0xa90/0xa90 [ 130.533467] rtnetlink_rcv_msg+0x46a/0xc20 [ 130.537727] ? rtnetlink_put_metrics+0x690/0x690 [ 130.542513] netlink_rcv_skb+0x172/0x440 [ 130.546577] ? rtnetlink_put_metrics+0x690/0x690 [ 130.551339] ? netlink_ack+0xb80/0xb80 [ 130.555240] rtnetlink_rcv+0x1c/0x20 [ 130.558954] netlink_unicast+0x5a5/0x760 [ 130.563007] ? netlink_attachskb+0x9a0/0x9a0 [ 130.567413] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 130.572940] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 130.577946] netlink_sendmsg+0xa18/0xfc0 [ 130.582006] ? netlink_unicast+0x760/0x760 [ 130.586230] ? aa_sock_msg_perm.isra.12+0xba/0x160 [ 130.591154] ? apparmor_socket_sendmsg+0x29/0x30 [ 130.595904] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 130.601433] ? security_socket_sendmsg+0x94/0xc0 [ 130.606181] ? netlink_unicast+0x760/0x760 [ 130.610412] sock_sendmsg+0xd5/0x120 [ 130.614115] ___sys_sendmsg+0x7fd/0x930 [ 130.618089] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 130.623901] ? kasan_check_read+0x11/0x20 [ 130.628055] ? copy_msghdr_from_user+0x580/0x580 [ 130.632810] ? __fget_light+0x2e9/0x430 [ 130.636774] ? fget_raw+0x20/0x20 [ 130.640222] ? lock_downgrade+0x900/0x900 [ 130.644364] ? lock_release+0x970/0x970 [ 130.648353] ? arch_local_save_flags+0x40/0x40 [ 130.652931] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 130.658370] ? routing_ioctl+0x890/0x890 [ 130.662429] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 130.667978] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 130.673506] ? sockfd_lookup_light+0xc5/0x160 [ 130.677992] __sys_sendmsg+0x11d/0x280 [ 130.681869] ? __ia32_sys_shutdown+0x80/0x80 [ 130.686268] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 130.691806] ? put_timespec64+0x10f/0x1b0 [ 130.695962] ? do_syscall_64+0x9a/0x820 [ 130.699931] ? do_syscall_64+0x9a/0x820 [ 130.703937] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 130.709407] __x64_sys_sendmsg+0x78/0xb0 [ 130.713472] do_syscall_64+0x1b9/0x820 [ 130.717349] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 130.722703] ? syscall_return_slowpath+0x5e0/0x5e0 [ 130.727622] ? trace_hardirqs_on_caller+0x310/0x310 [ 130.732637] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 130.737655] ? recalc_sigpending_tsk+0x180/0x180 [ 130.742406] ? kasan_check_write+0x14/0x20 [ 130.746632] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 130.751477] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 130.756667] RIP: 0033:0x457579 [ 130.759864] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 130.778773] RSP: 002b:00007f74d6967c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 130.786475] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 130.793733] RDX: 0000000000000000 RSI: 0000000020004300 RDI: 0000000000000003 [ 130.800997] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 130.808271] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f74d69686d4 [ 130.815529] R13: 00000000004c38b9 R14: 00000000004d5700 R15: 00000000ffffffff [ 130.822811] [ 130.824435] Allocated by task 5697: [ 130.828050] save_stack+0x43/0xd0 [ 130.831489] kasan_kmalloc+0xc7/0xe0 [ 130.835191] __kmalloc_node+0x47/0x70 [ 130.838978] qdisc_alloc+0x10f/0xb50 [ 130.842675] qdisc_create_dflt+0x7a/0x1e0 [ 130.846815] dev_activate+0x82f/0xcb0 [ 130.850608] __dev_open+0x2cb/0x410 [ 130.854221] dev_open+0xf2/0x1b0 [ 130.857576] bond_enslave+0xc9e/0x5d80 [ 130.861448] do_set_master+0x1c9/0x220 [ 130.865318] do_setlink+0xbe6/0x3f20 [ 130.869015] rtnl_newlink+0x136f/0x1d40 [ 130.872983] rtnetlink_rcv_msg+0x46a/0xc20 [ 130.877220] netlink_rcv_skb+0x172/0x440 [ 130.881268] rtnetlink_rcv+0x1c/0x20 [ 130.884966] netlink_unicast+0x5a5/0x760 [ 130.889022] netlink_sendmsg+0xa18/0xfc0 [ 130.893086] sock_sendmsg+0xd5/0x120 [ 130.896787] ___sys_sendmsg+0x7fd/0x930 [ 130.900747] __sys_sendmsg+0x11d/0x280 [ 130.904620] __x64_sys_sendmsg+0x78/0xb0 [ 130.908673] do_syscall_64+0x1b9/0x820 [ 130.912550] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 130.917722] [ 130.919333] Freed by task 7414: [ 130.922601] save_stack+0x43/0xd0 [ 130.926039] __kasan_slab_free+0x102/0x150 [ 130.930258] kasan_slab_free+0xe/0x10 [ 130.934048] kfree+0xcf/0x230 [ 130.937140] qdisc_free+0x89/0x100 [ 130.940665] qdisc_free_cb+0x19/0x20 [ 130.944390] rcu_process_callbacks+0xf23/0x2670 [ 130.949061] __do_softirq+0x30b/0xad8 [ 130.952843] [ 130.954465] The buggy address belongs to the object at ffff8801c6db1200 [ 130.954465] which belongs to the cache kmalloc-1024 of size 1024 [ 130.967314] The buggy address is located 56 bytes inside of [ 130.967314] 1024-byte region [ffff8801c6db1200, ffff8801c6db1600) [ 130.979192] The buggy address belongs to the page: [ 130.984127] page:ffffea00071b6c00 count:1 mapcount:0 mapping:ffff8801da800ac0 index:0x0 compound_mapcount: 0 [ 130.984148] flags: 0x2fffc0000008100(slab|head) [ 130.984174] raw: 02fffc0000008100 ffffea000712a808 ffffea0007073288 ffff8801da800ac0 [ 130.998824] raw: 0000000000000000 ffff8801c6db0000 0000000100000007 0000000000000000 [ 130.998832] page dumped because: kasan: bad access detected [ 130.998837] [ 130.998849] Memory state around the buggy address: [ 131.026861] ffff8801c6db1100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 131.034231] ffff8801c6db1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 131.041597] >ffff8801c6db1200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 131.048943] ^ [ 131.054143] ffff8801c6db1280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 131.061585] ffff8801c6db1300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 131.068926] ================================================================== [ 131.076274] Disabling lock debugging due to kernel taint [ 131.083519] Kernel panic - not syncing: panic_on_warn set ... [ 131.083519] [ 131.090918] CPU: 0 PID: 7424 Comm: syz-executor3 Tainted: G B 4.19.0-rc5+ #239 [ 131.099583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.108944] Call Trace: [ 131.111544] dump_stack+0x1c4/0x2b4 [ 131.115181] ? dump_stack_print_info.cold.2+0x52/0x52 [ 131.120401] panic+0x238/0x4e7 01:18:27 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000100)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000140)=0x100, 0xfd50) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000008c0)={r2}) connect$pppoe(r3, &(0x7f0000000900)={0x18, 0x0, {0x2, @remote, 'bridge_slave_1\x00'}}, 0x1e) sendto$inet6(r2, &(0x7f0000000300)="9b3328deb0c3e21be251ce8a756127ed775dfbf3e506708da297fbfa056db03c31d858396934667786e62693471882d04a9cc5c667eb4bcd78bb11c78d10484a0d835847ffb75795ef7145118f84dcf94600000000000000000000000000000200", 0xfffffffffffffe5a, 0x20000004, &(0x7f00000002c0)={0xa, 0x100000004e22, 0x0, @empty, 0x7}, 0x1c) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, &(0x7f0000000040)=0x6e, 0x80000) sendmmsg$unix(r4, &(0x7f0000000200), 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r2, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x3f000000, 0x1500]}}, 0x1c) accept(r4, &(0x7f0000000200)=@generic, &(0x7f0000000280)=0x80) close(r1) 01:18:27 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x3, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}]}, 0x210) r2 = socket$inet6(0xa, 0x1000040000006, 0x3) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x2d, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 01:18:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f0000000280)=""/162, &(0x7f0000000340)=0xa2) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './file0', [{0x20, 'bdev('}], 0xa, "45f1a0672fab3a431075e215f4b656e686886a7889d32c2ad16ddb064e2bbdabac3c92eb05bbc1e2c58148f1000367dd06b09ac7885955531c470ebdfb0b3dc587f643805286626caf0fa25db16d894cc642b217e968b823ca6c595dcd13fc95b7e455ac69cbb5e21ed39ec09dc4a8049930c6f3984dfaaa5577ddcb187248eda5648880d4ee502a7b2e1736f78540f815211e1603195b348dc91700710b166902a485b20bb4449ac9495d616267c33cb45c2e84aa25ef17268472bc3181cfa83c"}, 0xd2) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=@ipv4_newrule={0x28, 0x20, 0x1, 0x0, 0x0, {0x5, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x4}, [@FRA_DST={0x8, 0x1, @local}]}, 0x28}}, 0x0) 01:18:27 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x20, 0x400, 0x40, 0x9, 0x8, 0x5, 0x7fff, 0x8001, 0x3fe0000000000, 0x2, 0x100000000}, 0xb) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/2, 0x121e001, 0x800}, 0x18) setsockopt$XDP_RX_RING(r0, 0x11b, 0x3, &(0x7f0000000100)=0x2, 0x4) 01:18:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000180)=0xfffffffffffffc85, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x195) recvmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000080)=@sco, 0x80, &(0x7f0000000580)=[{&(0x7f0000000480)=""/143, 0xfffffdde}], 0x8}, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) [ 131.123101] kobject: 'loop1' (000000004e2c4ac2): kobject_uevent_env [ 131.123608] ? add_taint.cold.5+0x16/0x16 [ 131.134169] ? preempt_schedule+0x4d/0x60 [ 131.134410] kobject: 'loop1' (000000004e2c4ac2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 131.138329] ? ___preempt_schedule+0x16/0x18 [ 131.138347] ? trace_hardirqs_on+0xb4/0x310 [ 131.138366] kasan_end_report+0x47/0x4f [ 131.138390] kasan_report.cold.9+0x76/0x309 [ 131.138406] ? tcf_block_find+0x9d1/0xb90 [ 131.138420] __asan_report_load4_noabort+0x14/0x20 [ 131.138432] tcf_block_find+0x9d1/0xb90 [ 131.138448] tc_del_tfilter+0x42b/0x1290 [ 131.138469] ? tc_get_tfilter+0xa90/0xa90 [ 131.186132] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 131.191697] ? check_preemption_disabled+0x48/0x200 [ 131.196727] ? check_preemption_disabled+0x48/0x200 [ 131.201766] ? __lock_is_held+0xb5/0x140 [ 131.205853] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 131.211412] ? rtnl_get_link+0x170/0x370 [ 131.215495] ? tc_get_tfilter+0xa90/0xa90 [ 131.219661] rtnetlink_rcv_msg+0x46a/0xc20 01:18:27 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000800)={0x2, 0x0, @multicast2}, &(0x7f0000000840)=0x10, 0x80000) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000980)={'broute\x00', 0x0, 0x3, 0x81, [], 0x1, &(0x7f0000000880)=[{}], &(0x7f00000008c0)=""/129}, &(0x7f0000000a00)=0x78) r2 = socket$packet(0x11, 0x2, 0x300) r3 = socket(0x200000000000011, 0x802, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000440)={'gre0\x00', 0x0}) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0xffffffffffffffa9) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f00000001c0)=0x8) recvmsg$kcm(r3, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/242, 0xf2}, {&(0x7f00000001c0)}, {&(0x7f00000002c0)=""/222, 0xde}, {&(0x7f0000000480)=""/153, 0x99}, {&(0x7f0000000540)=""/147, 0x93}, {&(0x7f0000000200)=""/59, 0x3b}, {&(0x7f00000003c0)=""/69, 0x45}], 0x7, &(0x7f0000000240), 0x0, 0x80000000}, 0x10000) getsockname$llc(r3, &(0x7f0000000a40)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000ac0)=0x29b) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0}, &(0x7f0000000700)=0xc) sendmsg$nl_route(r3, &(0x7f00000007c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)=@ipv6_delroute={0x24, 0x19, 0x700, 0x70bd2a, 0x25dfdbff, {0xa, 0xa0, 0x20, 0x1b, 0xff, 0x2, 0xff, 0xb, 0x2400}, [@RTA_UID={0x8, 0x19, r5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) [ 131.223909] ? rtnetlink_put_metrics+0x690/0x690 [ 131.228683] netlink_rcv_skb+0x172/0x440 [ 131.232755] ? rtnetlink_put_metrics+0x690/0x690 [ 131.237523] ? netlink_ack+0xb80/0xb80 [ 131.241453] rtnetlink_rcv+0x1c/0x20 [ 131.245177] netlink_unicast+0x5a5/0x760 [ 131.249252] ? netlink_attachskb+0x9a0/0x9a0 [ 131.253679] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 131.259225] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 131.264252] netlink_sendmsg+0xa18/0xfc0 [ 131.268329] ? netlink_unicast+0x760/0x760 [ 131.272577] ? aa_sock_msg_perm.isra.12+0xba/0x160 01:18:27 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000498000)={&(0x7f0000d55000), 0xc, &(0x7f0000c8d000)={&(0x7f0000bfdfdc)={0x14, 0x0, 0x1, 0x800000001}, 0x14}}, 0x0) r1 = epoll_create(0x81) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) [ 131.277534] ? apparmor_socket_sendmsg+0x29/0x30 [ 131.277554] kobject: 'loop4' (00000000e23d48c6): kobject_uevent_env [ 131.282327] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 131.294291] ? security_socket_sendmsg+0x94/0xc0 [ 131.299055] ? netlink_unicast+0x760/0x760 [ 131.299167] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 131.303298] sock_sendmsg+0xd5/0x120 [ 131.303315] ___sys_sendmsg+0x7fd/0x930 [ 131.303338] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 131.324327] kobject: 'loop4' (00000000e23d48c6): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 131.327126] ? kasan_check_read+0x11/0x20 [ 131.327149] ? copy_msghdr_from_user+0x580/0x580 [ 131.327172] ? __fget_light+0x2e9/0x430 [ 131.327187] ? fget_raw+0x20/0x20 [ 131.327207] ? lock_downgrade+0x900/0x900 [ 131.357110] ? lock_release+0x970/0x970 [ 131.359768] kobject: 'loop5' (0000000095ff6d30): kobject_uevent_env [ 131.361095] ? arch_local_save_flags+0x40/0x40 [ 131.361114] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 131.361130] ? routing_ioctl+0x890/0x890 [ 131.361151] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 131.376797] kobject: 'loop5' (0000000095ff6d30): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 131.377585] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 131.377602] ? sockfd_lookup_light+0xc5/0x160 [ 131.377619] __sys_sendmsg+0x11d/0x280 [ 131.377639] ? __ia32_sys_shutdown+0x80/0x80 [ 131.415126] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 131.420680] ? put_timespec64+0x10f/0x1b0 [ 131.424834] ? do_syscall_64+0x9a/0x820 [ 131.428807] ? do_syscall_64+0x9a/0x820 [ 131.434309] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 131.439767] __x64_sys_sendmsg+0x78/0xb0 [ 131.443831] do_syscall_64+0x1b9/0x820 [ 131.447737] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 131.453106] ? syscall_return_slowpath+0x5e0/0x5e0 [ 131.458045] ? trace_hardirqs_on_caller+0x310/0x310 [ 131.463064] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 131.468084] ? recalc_sigpending_tsk+0x180/0x180 [ 131.472847] ? kasan_check_write+0x14/0x20 [ 131.477092] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 131.481946] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 131.487136] RIP: 0033:0x457579 [ 131.490334] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 131.509239] RSP: 002b:00007f74d6967c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 131.516955] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 131.524229] RDX: 0000000000000000 RSI: 0000000020004300 RDI: 0000000000000003 [ 131.531518] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 131.538945] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f74d69686d4 [ 131.546214] R13: 00000000004c38b9 R14: 00000000004d5700 R15: 00000000ffffffff [ 131.554367] Kernel Offset: disabled [ 131.558029] Rebooting in 86400 seconds..