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"}}}}}}, 0x0) [ 159.799742][ T9478] IPVS: ftp: loaded support on port[0] = 21 [ 159.844983][ T9479] IPVS: ftp: loaded support on port[0] = 21 01:29:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) r3 = openat$cgroup_ro(r2, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r2, r3, 0x8000000000d}, 0x10) 01:29:56 executing program 1: syz_emit_ethernet(0x437, &(0x7f00008bbfba)={@broadcast, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x401, 0x11, 0x0, @remote={0xfe, 0x80, [], 0xffffffff0a000000}, @mcast2, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "24a589", 0x0, '~9\f'}, "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"}}}}}}, 0x0) 01:29:56 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x9400}], 0x1}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 01:29:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_tcp(0x2, 0x1, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000080), 0xfffffffffffffee4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x7c774aac) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000180)={0x0, @multicast1, 0x0, 0x4, 'nq\x00', 0x2b, 0x0, 0xa}, 0x2c) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r1, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000140), &(0x7f0000000240)=0x4) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000004, 0x2013, r1, 0x500000) syz_genetlink_get_family_id$fou(&(0x7f00000006c0)='fou\x00') ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000100)=ANY=[], 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000280)="fb15e638f876a49052a7a95d1ce04045", 0xfffffffffffffe52) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) unshare(0x60000000) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000001c0)=@int=0x1, 0x4) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r3, &(0x7f0000005dc0)=[{{&(0x7f0000001a40)=@generic, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x440}], 0x1, 0x0, 0x0) getsockname(r0, &(0x7f00000000c0)=@ethernet={0x0, @dev}, &(0x7f0000000200)=0x80) syz_genetlink_get_family_id$fou(0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) 01:29:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_tcp(0x2, 0x1, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000080), 0xfffffffffffffee4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x7c774aac) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000180)={0x0, @multicast1, 0x0, 0x4, 'nq\x00', 0x2b, 0x0, 0xa}, 0x2c) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r1, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000140), &(0x7f0000000240)=0x4) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000004, 0x2013, r1, 0x500000) syz_genetlink_get_family_id$fou(&(0x7f00000006c0)='fou\x00') ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000100)=ANY=[], 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000280)="fb15e638f876a49052a7a95d1ce04045", 0xfffffffffffffe52) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) unshare(0x60000000) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000001c0)=@int=0x1, 0x4) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r3, &(0x7f0000005dc0)=[{{&(0x7f0000001a40)=@generic, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x440}], 0x1, 0x0, 0x0) getsockname(r0, &(0x7f00000000c0)=@ethernet={0x0, @dev}, &(0x7f0000000200)=0x80) syz_genetlink_get_family_id$fou(0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) 01:29:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x1, 0x0, 0x101}) 01:29:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) r3 = openat$cgroup_ro(r2, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r2, r3, 0x8000000000d}, 0x10) [ 160.722978][ T9510] IPVS: ftp: loaded support on port[0] = 21 [ 161.086381][ T9527] IPVS: ftp: loaded support on port[0] = 21 01:29:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) r3 = openat$cgroup_ro(r2, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r2, r3, 0x8000000000d}, 0x10) 01:29:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x1, 0x0, 0x101}) 01:29:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) r3 = openat$cgroup_ro(r2, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r2, r3, 0x8000000000d}, 0x10) 01:29:57 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x9400}], 0x1}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 01:29:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x1, 0x0, 0x101}) 01:29:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) r3 = openat$cgroup_ro(r2, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r2, r3, 0x8000000000d}, 0x10) 01:29:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) r3 = openat$cgroup_ro(r2, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r2, r3, 0x8000000000d}, 0x10) 01:29:57 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0x100010001, 0x2, 0xffffffffffffffff, 0x0, [0xd]}, 0x2c) 01:29:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x1, 0x0, 0x101}) 01:29:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) r3 = openat$cgroup_ro(r2, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r2, r3, 0x8000000000d}, 0x10) 01:29:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0x100010001, 0x2, 0xffffffffffffffff, 0x0, [0xd]}, 0x2c) 01:29:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0xe21}, 0x10) r2 = socket$inet(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000eed000)={0x2, 0x4e21}, 0x10) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 01:29:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x71, &(0x7f0000ad2000), &(0x7f0000000080)=0x23c) 01:29:58 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0xb) 01:29:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0x100010001, 0x2, 0xffffffffffffffff, 0x0, [0xd]}, 0x2c) 01:29:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0x100010001, 0x2, 0xffffffffffffffff, 0x0, [0xd]}, 0x2c) 01:29:58 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYRESHEX], 0xff92) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 01:29:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0xe21}, 0x10) r2 = socket$inet(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000eed000)={0x2, 0x4e21}, 0x10) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 01:29:58 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0xb) 01:29:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x71, &(0x7f0000ad2000), &(0x7f0000000080)=0x23c) 01:29:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket(0x15, 0x80005, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x401}, 0x1c) 01:29:58 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0xb) 01:29:58 executing program 2: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffee1, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000003c0)=@assoc_value={0x0, 0x7}, &(0x7f0000000400)=0x8) ppoll(&(0x7f0000000500)=[{r1, 0x2100}, {}], 0x2, &(0x7f0000000580)={0x0, r2+10000000}, 0x0, 0x0) clock_gettime(0x6, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffff9c, 0x10f, 0x87, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) accept4$nfc_llcp(r3, &(0x7f0000000200), &(0x7f0000000100)=0x60, 0x80000) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ppoll(&(0x7f00000000c0)=[{r1, 0x14}], 0x1, &(0x7f0000000140)={0x0, r4+10000000}, 0x0, 0x0) 01:29:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0xe21}, 0x10) r2 = socket$inet(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000eed000)={0x2, 0x4e21}, 0x10) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 01:29:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x71, &(0x7f0000ad2000), &(0x7f0000000080)=0x23c) 01:29:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket(0x15, 0x80005, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x401}, 0x1c) 01:29:58 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0xb) 01:29:58 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYRESHEX], 0xff92) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 01:29:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0xe21}, 0x10) r2 = socket$inet(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000eed000)={0x2, 0x4e21}, 0x10) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 01:29:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket(0x15, 0x80005, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x401}, 0x1c) 01:29:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x71, &(0x7f0000ad2000), &(0x7f0000000080)=0x23c) 01:29:58 executing program 4: unshare(0x400) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) tee(r1, r0, 0x2008, 0x0) 01:29:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket(0x15, 0x80005, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x401}, 0x1c) 01:29:59 executing program 4: unshare(0x400) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) tee(r1, r0, 0x2008, 0x0) 01:30:02 executing program 2: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffee1, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000003c0)=@assoc_value={0x0, 0x7}, &(0x7f0000000400)=0x8) ppoll(&(0x7f0000000500)=[{r1, 0x2100}, {}], 0x2, &(0x7f0000000580)={0x0, r2+10000000}, 0x0, 0x0) clock_gettime(0x6, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffff9c, 0x10f, 0x87, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) accept4$nfc_llcp(r3, &(0x7f0000000200), &(0x7f0000000100)=0x60, 0x80000) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ppoll(&(0x7f00000000c0)=[{r1, 0x14}], 0x1, &(0x7f0000000140)={0x0, r4+10000000}, 0x0, 0x0) 01:30:02 executing program 1: connect$pppoe(0xffffffffffffffff, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0'}, 0xffffff0c) socket$alg(0x26, 0x5, 0x0) 01:30:02 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x100000, 0x2, 0x52, r0, 0x0) mmap$xdp(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x13, r0, 0x0) 01:30:02 executing program 4: unshare(0x400) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) tee(r1, r0, 0x2008, 0x0) 01:30:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="31000000130009006900000000000010ab008048130000004600010700000014080003c025250000000001f50000000000", 0x31}], 0x1) 01:30:02 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYRESHEX], 0xff92) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 01:30:03 executing program 4: unshare(0x400) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) tee(r1, r0, 0x2008, 0x0) 01:30:03 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x100000, 0x2, 0x52, r0, 0x0) mmap$xdp(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x13, r0, 0x0) [ 166.755997][ T9658] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.5'. 01:30:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="31000000130009006900000000000010ab008048130000004600010700000014080003c025250000000001f50000000000", 0x31}], 0x1) 01:30:03 executing program 4: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffee1, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000003c0)=@assoc_value={0x0, 0x7}, &(0x7f0000000400)=0x8) ppoll(&(0x7f0000000500)=[{r1, 0x2100}, {}], 0x2, &(0x7f0000000580)={0x0, r2+10000000}, 0x0, 0x0) clock_gettime(0x6, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffff9c, 0x10f, 0x87, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) accept4$nfc_llcp(r3, &(0x7f0000000200), &(0x7f0000000100)=0x60, 0x80000) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ppoll(&(0x7f00000000c0)=[{r1, 0x14}], 0x1, &(0x7f0000000140)={0x0, r4+10000000}, 0x0, 0x0) 01:30:03 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x100000, 0x2, 0x52, r0, 0x0) mmap$xdp(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x13, r0, 0x0) [ 166.965208][ T9678] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.5'. 01:30:03 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYRESHEX], 0xff92) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 01:30:05 executing program 2: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffee1, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000003c0)=@assoc_value={0x0, 0x7}, &(0x7f0000000400)=0x8) ppoll(&(0x7f0000000500)=[{r1, 0x2100}, {}], 0x2, &(0x7f0000000580)={0x0, r2+10000000}, 0x0, 0x0) clock_gettime(0x6, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffff9c, 0x10f, 0x87, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) accept4$nfc_llcp(r3, &(0x7f0000000200), &(0x7f0000000100)=0x60, 0x80000) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ppoll(&(0x7f00000000c0)=[{r1, 0x14}], 0x1, &(0x7f0000000140)={0x0, r4+10000000}, 0x0, 0x0) 01:30:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="31000000130009006900000000000010ab008048130000004600010700000014080003c025250000000001f50000000000", 0x31}], 0x1) 01:30:05 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x100000, 0x2, 0x52, r0, 0x0) mmap$xdp(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x13, r0, 0x0) 01:30:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f3188b070") r2 = accept$alg(r0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007b40)=[{{&(0x7f0000000180)=@l2, 0x304}}, {{&(0x7f0000007500)=@hci, 0x80, &(0x7f0000007680), 0x141, &(0x7f00000076c0), 0x10}}], 0x4000000000003d5, 0x0) 01:30:05 executing program 1: connect$pppoe(0xffffffffffffffff, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0'}, 0xffffff0c) socket$alg(0x26, 0x5, 0x0) 01:30:05 executing program 4: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffee1, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000003c0)=@assoc_value={0x0, 0x7}, &(0x7f0000000400)=0x8) ppoll(&(0x7f0000000500)=[{r1, 0x2100}, {}], 0x2, &(0x7f0000000580)={0x0, r2+10000000}, 0x0, 0x0) clock_gettime(0x6, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffff9c, 0x10f, 0x87, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) accept4$nfc_llcp(r3, &(0x7f0000000200), &(0x7f0000000100)=0x60, 0x80000) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ppoll(&(0x7f00000000c0)=[{r1, 0x14}], 0x1, &(0x7f0000000140)={0x0, r4+10000000}, 0x0, 0x0) [ 169.415836][ T9707] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.5'. 01:30:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaa0d0000000000000023d5080800000000000000000000000000000000"], 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) recvfrom$inet6(r2, &(0x7f0000000040)=""/72, 0xfffffffffffffd62, 0x2001, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @empty, 0x101}, 0x15) openat$cgroup_int(r1, &(0x7f0000002340)='cpuset.memory_spread_page\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) openat$cgroup_ro(r1, &(0x7f00000003c0)='cpu.stat\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, 0x0, 0xfd47) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmmsg(r4, &(0x7f0000001d40)=[{{&(0x7f0000000240)=@l2, 0x80, &(0x7f0000000980)=[{&(0x7f00000004c0)=""/108, 0x6c}, {&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f0000000340)=""/56, 0x38}, {&(0x7f0000000840)=""/170, 0xaa}, {&(0x7f0000000900)=""/103, 0x67}], 0x5}, 0x188573df}, {{&(0x7f0000001a40)=@ipx, 0x80, &(0x7f0000001c80)=[{0x0}, {&(0x7f0000001bc0)=""/37, 0x25}, {&(0x7f0000001c00)=""/98, 0x62}], 0x3, &(0x7f0000001cc0)=""/81, 0x51}, 0x200}], 0x2, 0x2000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000240)='GPL\x00', 0x2, 0x2e6, &(0x7f00001a7f05)=""/251}, 0x48) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x4031, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0xf76925ac}, 0x0) recvmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r4, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x4c, &(0x7f0000000000), 0xf}, 0x0) r5 = socket(0x1000100000009, 0x5, 0x1266) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) syz_genetlink_get_family_id$team(&(0x7f0000001540)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x1000004}, 0xc, &(0x7f0000001600)={&(0x7f0000000400)=ANY=[@ANYRES32=r7], 0x1}}, 0x40011) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r5, 0x29, 0xd2, &(0x7f0000000540)={{0xa, 0x100000004e24, 0xd0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e21, 0x0, @local}, 0x4, [0x8, 0x9, 0x0, 0x0, 0x58f2, 0x6, 0xfffffffffffffffa, 0x7]}, 0x5c) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") r9 = socket(0x400020000000010, 0x2, 0x0) write(r9, &(0x7f0000000080)="1f00000054000d0000000000fc07ff1b070404000d00000007000100010039", 0x1f) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x89a2, &(0x7f0000000040)={'bridge0\x00', r7}) 01:30:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="31000000130009006900000000000010ab008048130000004600010700000014080003c025250000000001f50000000000", 0x31}], 0x1) 01:30:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f3188b070") r2 = accept$alg(r0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007b40)=[{{&(0x7f0000000180)=@l2, 0x304}}, {{&(0x7f0000007500)=@hci, 0x80, &(0x7f0000007680), 0x141, &(0x7f00000076c0), 0x10}}], 0x4000000000003d5, 0x0) [ 169.594324][ T9726] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.5'. 01:30:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f3188b070") r2 = accept$alg(r0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007b40)=[{{&(0x7f0000000180)=@l2, 0x304}}, {{&(0x7f0000007500)=@hci, 0x80, &(0x7f0000007680), 0x141, &(0x7f00000076c0), 0x10}}], 0x4000000000003d5, 0x0) 01:30:05 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0xe, 0x0, &(0x7f0000000200)) [ 169.716641][ T9730] PF_BRIDGE: br_mdb_parse() with invalid attr [ 169.791860][ T9730] bridge0: port 3(veth0_to_bridge) entered blocking state 01:30:06 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0xe, 0x0, &(0x7f0000000200)) [ 169.879086][ T9730] bridge0: port 3(veth0_to_bridge) entered disabled state [ 169.957817][ T9730] device veth0_to_bridge entered promiscuous mode [ 169.973993][ T9730] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 170.111866][ T9730] bridge0: port 3(veth0_to_bridge) entered blocking state [ 170.119168][ T9730] bridge0: port 3(veth0_to_bridge) entered forwarding state 01:30:08 executing program 2: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffee1, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000003c0)=@assoc_value={0x0, 0x7}, &(0x7f0000000400)=0x8) ppoll(&(0x7f0000000500)=[{r1, 0x2100}, {}], 0x2, &(0x7f0000000580)={0x0, r2+10000000}, 0x0, 0x0) clock_gettime(0x6, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffff9c, 0x10f, 0x87, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) accept4$nfc_llcp(r3, &(0x7f0000000200), &(0x7f0000000100)=0x60, 0x80000) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ppoll(&(0x7f00000000c0)=[{r1, 0x14}], 0x1, &(0x7f0000000140)={0x0, r4+10000000}, 0x0, 0x0) 01:30:08 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0xe, 0x0, &(0x7f0000000200)) 01:30:08 executing program 1: connect$pppoe(0xffffffffffffffff, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0'}, 0xffffff0c) socket$alg(0x26, 0x5, 0x0) 01:30:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f3188b070") r2 = accept$alg(r0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007b40)=[{{&(0x7f0000000180)=@l2, 0x304}}, {{&(0x7f0000007500)=@hci, 0x80, &(0x7f0000007680), 0x141, &(0x7f00000076c0), 0x10}}], 0x4000000000003d5, 0x0) 01:30:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaa0d0000000000000023d5080800000000000000000000000000000000"], 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) recvfrom$inet6(r2, &(0x7f0000000040)=""/72, 0xfffffffffffffd62, 0x2001, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @empty, 0x101}, 0x15) openat$cgroup_int(r1, &(0x7f0000002340)='cpuset.memory_spread_page\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) openat$cgroup_ro(r1, &(0x7f00000003c0)='cpu.stat\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, 0x0, 0xfd47) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmmsg(r4, &(0x7f0000001d40)=[{{&(0x7f0000000240)=@l2, 0x80, &(0x7f0000000980)=[{&(0x7f00000004c0)=""/108, 0x6c}, {&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f0000000340)=""/56, 0x38}, {&(0x7f0000000840)=""/170, 0xaa}, {&(0x7f0000000900)=""/103, 0x67}], 0x5}, 0x188573df}, {{&(0x7f0000001a40)=@ipx, 0x80, &(0x7f0000001c80)=[{0x0}, {&(0x7f0000001bc0)=""/37, 0x25}, {&(0x7f0000001c00)=""/98, 0x62}], 0x3, &(0x7f0000001cc0)=""/81, 0x51}, 0x200}], 0x2, 0x2000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000240)='GPL\x00', 0x2, 0x2e6, &(0x7f00001a7f05)=""/251}, 0x48) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x4031, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0xf76925ac}, 0x0) recvmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r4, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x4c, &(0x7f0000000000), 0xf}, 0x0) r5 = socket(0x1000100000009, 0x5, 0x1266) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) syz_genetlink_get_family_id$team(&(0x7f0000001540)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x1000004}, 0xc, &(0x7f0000001600)={&(0x7f0000000400)=ANY=[@ANYRES32=r7], 0x1}}, 0x40011) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r5, 0x29, 0xd2, &(0x7f0000000540)={{0xa, 0x100000004e24, 0xd0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e21, 0x0, @local}, 0x4, [0x8, 0x9, 0x0, 0x0, 0x58f2, 0x6, 0xfffffffffffffffa, 0x7]}, 0x5c) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") r9 = socket(0x400020000000010, 0x2, 0x0) write(r9, &(0x7f0000000080)="1f00000054000d0000000000fc07ff1b070404000d00000007000100010039", 0x1f) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x89a2, &(0x7f0000000040)={'bridge0\x00', r7}) 01:30:08 executing program 4: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffee1, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000003c0)=@assoc_value={0x0, 0x7}, &(0x7f0000000400)=0x8) ppoll(&(0x7f0000000500)=[{r1, 0x2100}, {}], 0x2, &(0x7f0000000580)={0x0, r2+10000000}, 0x0, 0x0) clock_gettime(0x6, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffff9c, 0x10f, 0x87, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) accept4$nfc_llcp(r3, &(0x7f0000000200), &(0x7f0000000100)=0x60, 0x80000) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ppoll(&(0x7f00000000c0)=[{r1, 0x14}], 0x1, &(0x7f0000000140)={0x0, r4+10000000}, 0x0, 0x0) 01:30:08 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0xe, 0x0, &(0x7f0000000200)) 01:30:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaa0d0000000000000023d5080800000000000000000000000000000000"], 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) recvfrom$inet6(r2, &(0x7f0000000040)=""/72, 0xfffffffffffffd62, 0x2001, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @empty, 0x101}, 0x15) openat$cgroup_int(r1, &(0x7f0000002340)='cpuset.memory_spread_page\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) openat$cgroup_ro(r1, &(0x7f00000003c0)='cpu.stat\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, 0x0, 0xfd47) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmmsg(r4, &(0x7f0000001d40)=[{{&(0x7f0000000240)=@l2, 0x80, &(0x7f0000000980)=[{&(0x7f00000004c0)=""/108, 0x6c}, {&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f0000000340)=""/56, 0x38}, {&(0x7f0000000840)=""/170, 0xaa}, {&(0x7f0000000900)=""/103, 0x67}], 0x5}, 0x188573df}, {{&(0x7f0000001a40)=@ipx, 0x80, &(0x7f0000001c80)=[{0x0}, {&(0x7f0000001bc0)=""/37, 0x25}, {&(0x7f0000001c00)=""/98, 0x62}], 0x3, &(0x7f0000001cc0)=""/81, 0x51}, 0x200}], 0x2, 0x2000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000240)='GPL\x00', 0x2, 0x2e6, &(0x7f00001a7f05)=""/251}, 0x48) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x4031, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0xf76925ac}, 0x0) recvmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r4, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x4c, &(0x7f0000000000), 0xf}, 0x0) r5 = socket(0x1000100000009, 0x5, 0x1266) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) syz_genetlink_get_family_id$team(&(0x7f0000001540)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x1000004}, 0xc, &(0x7f0000001600)={&(0x7f0000000400)=ANY=[@ANYRES32=r7], 0x1}}, 0x40011) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r5, 0x29, 0xd2, &(0x7f0000000540)={{0xa, 0x100000004e24, 0xd0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e21, 0x0, @local}, 0x4, [0x8, 0x9, 0x0, 0x0, 0x58f2, 0x6, 0xfffffffffffffffa, 0x7]}, 0x5c) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") r9 = socket(0x400020000000010, 0x2, 0x0) write(r9, &(0x7f0000000080)="1f00000054000d0000000000fc07ff1b070404000d00000007000100010039", 0x1f) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x89a2, &(0x7f0000000040)={'bridge0\x00', r7}) 01:30:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaa0d0000000000000023d5080800000000000000000000000000000000"], 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) recvfrom$inet6(r2, &(0x7f0000000040)=""/72, 0xfffffffffffffd62, 0x2001, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @empty, 0x101}, 0x15) openat$cgroup_int(r1, &(0x7f0000002340)='cpuset.memory_spread_page\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) openat$cgroup_ro(r1, &(0x7f00000003c0)='cpu.stat\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, 0x0, 0xfd47) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmmsg(r4, &(0x7f0000001d40)=[{{&(0x7f0000000240)=@l2, 0x80, &(0x7f0000000980)=[{&(0x7f00000004c0)=""/108, 0x6c}, {&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f0000000340)=""/56, 0x38}, {&(0x7f0000000840)=""/170, 0xaa}, {&(0x7f0000000900)=""/103, 0x67}], 0x5}, 0x188573df}, {{&(0x7f0000001a40)=@ipx, 0x80, &(0x7f0000001c80)=[{0x0}, {&(0x7f0000001bc0)=""/37, 0x25}, {&(0x7f0000001c00)=""/98, 0x62}], 0x3, &(0x7f0000001cc0)=""/81, 0x51}, 0x200}], 0x2, 0x2000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000240)='GPL\x00', 0x2, 0x2e6, &(0x7f00001a7f05)=""/251}, 0x48) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x4031, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0xf76925ac}, 0x0) recvmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r4, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x4c, &(0x7f0000000000), 0xf}, 0x0) r5 = socket(0x1000100000009, 0x5, 0x1266) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) syz_genetlink_get_family_id$team(&(0x7f0000001540)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x1000004}, 0xc, &(0x7f0000001600)={&(0x7f0000000400)=ANY=[@ANYRES32=r7], 0x1}}, 0x40011) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r5, 0x29, 0xd2, &(0x7f0000000540)={{0xa, 0x100000004e24, 0xd0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e21, 0x0, @local}, 0x4, [0x8, 0x9, 0x0, 0x0, 0x58f2, 0x6, 0xfffffffffffffffa, 0x7]}, 0x5c) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") r9 = socket(0x400020000000010, 0x2, 0x0) write(r9, &(0x7f0000000080)="1f00000054000d0000000000fc07ff1b070404000d00000007000100010039", 0x1f) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x89a2, &(0x7f0000000040)={'bridge0\x00', r7}) [ 172.367462][ T9778] PF_BRIDGE: br_mdb_parse() with invalid attr [ 172.513357][ T9786] PF_BRIDGE: br_mdb_parse() with invalid attr [ 172.569150][ T9786] bridge0: port 3(veth0_to_bridge) entered blocking state [ 172.622683][ T9786] bridge0: port 3(veth0_to_bridge) entered disabled state [ 172.675085][ T9786] device veth0_to_bridge entered promiscuous mode [ 172.734784][ T9786] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) 01:30:09 executing program 1: connect$pppoe(0xffffffffffffffff, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0'}, 0xffffff0c) socket$alg(0x26, 0x5, 0x0) [ 172.820801][ T9786] bridge0: port 3(veth0_to_bridge) entered blocking state [ 172.828049][ T9786] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 172.985628][ T9789] PF_BRIDGE: br_mdb_parse() with invalid attr [ 173.019146][ T9790] bridge0: port 3(veth0_to_bridge) entered blocking state [ 173.084060][ T9790] bridge0: port 3(veth0_to_bridge) entered disabled state [ 173.219836][ T9790] device veth0_to_bridge entered promiscuous mode [ 173.295462][ T9790] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) 01:30:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaa0d0000000000000023d5080800000000000000000000000000000000"], 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) recvfrom$inet6(r2, &(0x7f0000000040)=""/72, 0xfffffffffffffd62, 0x2001, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @empty, 0x101}, 0x15) openat$cgroup_int(r1, &(0x7f0000002340)='cpuset.memory_spread_page\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) openat$cgroup_ro(r1, &(0x7f00000003c0)='cpu.stat\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, 0x0, 0xfd47) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmmsg(r4, &(0x7f0000001d40)=[{{&(0x7f0000000240)=@l2, 0x80, &(0x7f0000000980)=[{&(0x7f00000004c0)=""/108, 0x6c}, {&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f0000000340)=""/56, 0x38}, {&(0x7f0000000840)=""/170, 0xaa}, {&(0x7f0000000900)=""/103, 0x67}], 0x5}, 0x188573df}, {{&(0x7f0000001a40)=@ipx, 0x80, &(0x7f0000001c80)=[{0x0}, {&(0x7f0000001bc0)=""/37, 0x25}, {&(0x7f0000001c00)=""/98, 0x62}], 0x3, &(0x7f0000001cc0)=""/81, 0x51}, 0x200}], 0x2, 0x2000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000240)='GPL\x00', 0x2, 0x2e6, &(0x7f00001a7f05)=""/251}, 0x48) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x4031, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0xf76925ac}, 0x0) recvmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r4, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x4c, &(0x7f0000000000), 0xf}, 0x0) r5 = socket(0x1000100000009, 0x5, 0x1266) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) syz_genetlink_get_family_id$team(&(0x7f0000001540)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x1000004}, 0xc, &(0x7f0000001600)={&(0x7f0000000400)=ANY=[@ANYRES32=r7], 0x1}}, 0x40011) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r5, 0x29, 0xd2, &(0x7f0000000540)={{0xa, 0x100000004e24, 0xd0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e21, 0x0, @local}, 0x4, [0x8, 0x9, 0x0, 0x0, 0x58f2, 0x6, 0xfffffffffffffffa, 0x7]}, 0x5c) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") r9 = socket(0x400020000000010, 0x2, 0x0) write(r9, &(0x7f0000000080)="1f00000054000d0000000000fc07ff1b070404000d00000007000100010039", 0x1f) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x89a2, &(0x7f0000000040)={'bridge0\x00', r7}) [ 173.493854][ T9790] bridge0: port 3(veth0_to_bridge) entered blocking state [ 173.501111][ T9790] bridge0: port 3(veth0_to_bridge) entered forwarding state 01:30:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaa0d0000000000000023d5080800000000000000000000000000000000"], 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) recvfrom$inet6(r2, &(0x7f0000000040)=""/72, 0xfffffffffffffd62, 0x2001, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @empty, 0x101}, 0x15) openat$cgroup_int(r1, &(0x7f0000002340)='cpuset.memory_spread_page\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) openat$cgroup_ro(r1, &(0x7f00000003c0)='cpu.stat\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, 0x0, 0xfd47) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmmsg(r4, &(0x7f0000001d40)=[{{&(0x7f0000000240)=@l2, 0x80, &(0x7f0000000980)=[{&(0x7f00000004c0)=""/108, 0x6c}, {&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f0000000340)=""/56, 0x38}, {&(0x7f0000000840)=""/170, 0xaa}, {&(0x7f0000000900)=""/103, 0x67}], 0x5}, 0x188573df}, {{&(0x7f0000001a40)=@ipx, 0x80, &(0x7f0000001c80)=[{0x0}, {&(0x7f0000001bc0)=""/37, 0x25}, {&(0x7f0000001c00)=""/98, 0x62}], 0x3, &(0x7f0000001cc0)=""/81, 0x51}, 0x200}], 0x2, 0x2000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000240)='GPL\x00', 0x2, 0x2e6, &(0x7f00001a7f05)=""/251}, 0x48) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x4031, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0xf76925ac}, 0x0) recvmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r4, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x4c, &(0x7f0000000000), 0xf}, 0x0) r5 = socket(0x1000100000009, 0x5, 0x1266) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) syz_genetlink_get_family_id$team(&(0x7f0000001540)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x1000004}, 0xc, &(0x7f0000001600)={&(0x7f0000000400)=ANY=[@ANYRES32=r7], 0x1}}, 0x40011) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r5, 0x29, 0xd2, &(0x7f0000000540)={{0xa, 0x100000004e24, 0xd0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e21, 0x0, @local}, 0x4, [0x8, 0x9, 0x0, 0x0, 0x58f2, 0x6, 0xfffffffffffffffa, 0x7]}, 0x5c) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") r9 = socket(0x400020000000010, 0x2, 0x0) write(r9, &(0x7f0000000080)="1f00000054000d0000000000fc07ff1b070404000d00000007000100010039", 0x1f) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x89a2, &(0x7f0000000040)={'bridge0\x00', r7}) [ 173.765328][ T9797] PF_BRIDGE: br_mdb_parse() with invalid attr [ 173.962637][ T9807] PF_BRIDGE: br_mdb_parse() with invalid attr 01:30:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaa0d0000000000000023d5080800000000000000000000000000000000"], 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) recvfrom$inet6(r2, &(0x7f0000000040)=""/72, 0xfffffffffffffd62, 0x2001, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @empty, 0x101}, 0x15) openat$cgroup_int(r1, &(0x7f0000002340)='cpuset.memory_spread_page\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) openat$cgroup_ro(r1, &(0x7f00000003c0)='cpu.stat\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, 0x0, 0xfd47) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmmsg(r4, &(0x7f0000001d40)=[{{&(0x7f0000000240)=@l2, 0x80, &(0x7f0000000980)=[{&(0x7f00000004c0)=""/108, 0x6c}, {&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f0000000340)=""/56, 0x38}, {&(0x7f0000000840)=""/170, 0xaa}, {&(0x7f0000000900)=""/103, 0x67}], 0x5}, 0x188573df}, {{&(0x7f0000001a40)=@ipx, 0x80, &(0x7f0000001c80)=[{0x0}, {&(0x7f0000001bc0)=""/37, 0x25}, {&(0x7f0000001c00)=""/98, 0x62}], 0x3, &(0x7f0000001cc0)=""/81, 0x51}, 0x200}], 0x2, 0x2000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000240)='GPL\x00', 0x2, 0x2e6, &(0x7f00001a7f05)=""/251}, 0x48) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x4031, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0xf76925ac}, 0x0) recvmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r4, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x4c, &(0x7f0000000000), 0xf}, 0x0) r5 = socket(0x1000100000009, 0x5, 0x1266) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) syz_genetlink_get_family_id$team(&(0x7f0000001540)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x1000004}, 0xc, &(0x7f0000001600)={&(0x7f0000000400)=ANY=[@ANYRES32=r7], 0x1}}, 0x40011) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r5, 0x29, 0xd2, &(0x7f0000000540)={{0xa, 0x100000004e24, 0xd0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e21, 0x0, @local}, 0x4, [0x8, 0x9, 0x0, 0x0, 0x58f2, 0x6, 0xfffffffffffffffa, 0x7]}, 0x5c) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") r9 = socket(0x400020000000010, 0x2, 0x0) write(r9, &(0x7f0000000080)="1f00000054000d0000000000fc07ff1b070404000d00000007000100010039", 0x1f) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x89a2, &(0x7f0000000040)={'bridge0\x00', r7}) 01:30:12 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'sit0\x00'}) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'sit0\x00\x00\x00\x00\x00\x00\xfc\x00', 0x141}) 01:30:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f3188b070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r1, 0x8982, &(0x7f0000000100)={'\x06\x00\x00\x00\x04\x00\x00\x00\x00 \x00', @ifru_data=0x0}) 01:30:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaa0d0000000000000023d5080800000000000000000000000000000000"], 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) recvfrom$inet6(r2, &(0x7f0000000040)=""/72, 0xfffffffffffffd62, 0x2001, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @empty, 0x101}, 0x15) openat$cgroup_int(r1, &(0x7f0000002340)='cpuset.memory_spread_page\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) openat$cgroup_ro(r1, &(0x7f00000003c0)='cpu.stat\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, 0x0, 0xfd47) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmmsg(r4, &(0x7f0000001d40)=[{{&(0x7f0000000240)=@l2, 0x80, &(0x7f0000000980)=[{&(0x7f00000004c0)=""/108, 0x6c}, {&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f0000000340)=""/56, 0x38}, {&(0x7f0000000840)=""/170, 0xaa}, {&(0x7f0000000900)=""/103, 0x67}], 0x5}, 0x188573df}, {{&(0x7f0000001a40)=@ipx, 0x80, &(0x7f0000001c80)=[{0x0}, {&(0x7f0000001bc0)=""/37, 0x25}, {&(0x7f0000001c00)=""/98, 0x62}], 0x3, &(0x7f0000001cc0)=""/81, 0x51}, 0x200}], 0x2, 0x2000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000240)='GPL\x00', 0x2, 0x2e6, &(0x7f00001a7f05)=""/251}, 0x48) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x4031, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0xf76925ac}, 0x0) recvmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r4, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x4c, &(0x7f0000000000), 0xf}, 0x0) r5 = socket(0x1000100000009, 0x5, 0x1266) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) syz_genetlink_get_family_id$team(&(0x7f0000001540)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x1000004}, 0xc, &(0x7f0000001600)={&(0x7f0000000400)=ANY=[@ANYRES32=r7], 0x1}}, 0x40011) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r5, 0x29, 0xd2, &(0x7f0000000540)={{0xa, 0x100000004e24, 0xd0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e21, 0x0, @local}, 0x4, [0x8, 0x9, 0x0, 0x0, 0x58f2, 0x6, 0xfffffffffffffffa, 0x7]}, 0x5c) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") r9 = socket(0x400020000000010, 0x2, 0x0) write(r9, &(0x7f0000000080)="1f00000054000d0000000000fc07ff1b070404000d00000007000100010039", 0x1f) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x89a2, &(0x7f0000000040)={'bridge0\x00', r7}) 01:30:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaa0d0000000000000023d5080800000000000000000000000000000000"], 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) recvfrom$inet6(r2, &(0x7f0000000040)=""/72, 0xfffffffffffffd62, 0x2001, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @empty, 0x101}, 0x15) openat$cgroup_int(r1, &(0x7f0000002340)='cpuset.memory_spread_page\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) openat$cgroup_ro(r1, &(0x7f00000003c0)='cpu.stat\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, 0x0, 0xfd47) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmmsg(r4, &(0x7f0000001d40)=[{{&(0x7f0000000240)=@l2, 0x80, &(0x7f0000000980)=[{&(0x7f00000004c0)=""/108, 0x6c}, {&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f0000000340)=""/56, 0x38}, {&(0x7f0000000840)=""/170, 0xaa}, {&(0x7f0000000900)=""/103, 0x67}], 0x5}, 0x188573df}, {{&(0x7f0000001a40)=@ipx, 0x80, &(0x7f0000001c80)=[{0x0}, {&(0x7f0000001bc0)=""/37, 0x25}, {&(0x7f0000001c00)=""/98, 0x62}], 0x3, &(0x7f0000001cc0)=""/81, 0x51}, 0x200}], 0x2, 0x2000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000240)='GPL\x00', 0x2, 0x2e6, &(0x7f00001a7f05)=""/251}, 0x48) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x4031, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0xf76925ac}, 0x0) recvmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r4, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x4c, &(0x7f0000000000), 0xf}, 0x0) r5 = socket(0x1000100000009, 0x5, 0x1266) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) syz_genetlink_get_family_id$team(&(0x7f0000001540)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x1000004}, 0xc, &(0x7f0000001600)={&(0x7f0000000400)=ANY=[@ANYRES32=r7], 0x1}}, 0x40011) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r5, 0x29, 0xd2, &(0x7f0000000540)={{0xa, 0x100000004e24, 0xd0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e21, 0x0, @local}, 0x4, [0x8, 0x9, 0x0, 0x0, 0x58f2, 0x6, 0xfffffffffffffffa, 0x7]}, 0x5c) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") r9 = socket(0x400020000000010, 0x2, 0x0) write(r9, &(0x7f0000000080)="1f00000054000d0000000000fc07ff1b070404000d00000007000100010039", 0x1f) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x89a2, &(0x7f0000000040)={'bridge0\x00', r7}) 01:30:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaa0d0000000000000023d5080800000000000000000000000000000000"], 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) recvfrom$inet6(r2, &(0x7f0000000040)=""/72, 0xfffffffffffffd62, 0x2001, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @empty, 0x101}, 0x15) openat$cgroup_int(r1, &(0x7f0000002340)='cpuset.memory_spread_page\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) openat$cgroup_ro(r1, &(0x7f00000003c0)='cpu.stat\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, 0x0, 0xfd47) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmmsg(r4, &(0x7f0000001d40)=[{{&(0x7f0000000240)=@l2, 0x80, &(0x7f0000000980)=[{&(0x7f00000004c0)=""/108, 0x6c}, {&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f0000000340)=""/56, 0x38}, {&(0x7f0000000840)=""/170, 0xaa}, {&(0x7f0000000900)=""/103, 0x67}], 0x5}, 0x188573df}, {{&(0x7f0000001a40)=@ipx, 0x80, &(0x7f0000001c80)=[{0x0}, {&(0x7f0000001bc0)=""/37, 0x25}, {&(0x7f0000001c00)=""/98, 0x62}], 0x3, &(0x7f0000001cc0)=""/81, 0x51}, 0x200}], 0x2, 0x2000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000240)='GPL\x00', 0x2, 0x2e6, &(0x7f00001a7f05)=""/251}, 0x48) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x4031, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0xf76925ac}, 0x0) recvmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r4, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x4c, &(0x7f0000000000), 0xf}, 0x0) r5 = socket(0x1000100000009, 0x5, 0x1266) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) syz_genetlink_get_family_id$team(&(0x7f0000001540)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x1000004}, 0xc, &(0x7f0000001600)={&(0x7f0000000400)=ANY=[@ANYRES32=r7], 0x1}}, 0x40011) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r5, 0x29, 0xd2, &(0x7f0000000540)={{0xa, 0x100000004e24, 0xd0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e21, 0x0, @local}, 0x4, [0x8, 0x9, 0x0, 0x0, 0x58f2, 0x6, 0xfffffffffffffffa, 0x7]}, 0x5c) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") r9 = socket(0x400020000000010, 0x2, 0x0) write(r9, &(0x7f0000000080)="1f00000054000d0000000000fc07ff1b070404000d00000007000100010039", 0x1f) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x89a2, &(0x7f0000000040)={'bridge0\x00', r7}) 01:30:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f3188b070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r1, 0x8982, &(0x7f0000000100)={'\x06\x00\x00\x00\x04\x00\x00\x00\x00 \x00', @ifru_data=0x0}) [ 176.002374][ T9825] device sit0 entered promiscuous mode [ 176.136612][ T9825] device sit0 left promiscuous mode 01:30:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f3188b070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r1, 0x8982, &(0x7f0000000100)={'\x06\x00\x00\x00\x04\x00\x00\x00\x00 \x00', @ifru_data=0x0}) 01:30:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") sendmsg(0xffffffffffffffff, &(0x7f000001afc8)={0x0, 0x0, &(0x7f0000007f80)=[{&(0x7f00000001c0)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x1, 0x84) bind$inet(r1, &(0x7f0000000280)={0x2, 0x0, @remote}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x0) [ 176.510081][ T9844] PF_BRIDGE: br_mdb_parse() with invalid attr [ 176.518335][ T9845] PF_BRIDGE: br_mdb_parse() with invalid attr [ 176.543115][ T9847] PF_BRIDGE: br_mdb_parse() with invalid attr [ 176.634051][ T9846] PF_BRIDGE: br_mdb_parse() with invalid attr [ 176.694378][ T9850] bridge0: port 3(veth0_to_bridge) entered blocking state [ 176.767457][ T9850] bridge0: port 3(veth0_to_bridge) entered disabled state [ 176.816145][ T9850] device veth0_to_bridge entered promiscuous mode [ 176.887831][ T9850] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 177.004071][ T9850] bridge0: port 3(veth0_to_bridge) entered blocking state [ 177.011409][ T9850] bridge0: port 3(veth0_to_bridge) entered forwarding state 01:30:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f3188b070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r1, 0x8982, &(0x7f0000000100)={'\x06\x00\x00\x00\x04\x00\x00\x00\x00 \x00', @ifru_data=0x0}) 01:30:13 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) openat$cgroup_ro(r0, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/61, 0x3d}}], 0x1, 0x0, 0x0) readv(r1, &(0x7f00000002c0), 0x1a5) 01:30:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(serpent-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendto$packet(r1, &(0x7f0000000100)="c41d02f107956ee2f017ef0a9554c837532e08896b2d9cde0092c7dea0d1107f551165aa7ab0c4953b28a7", 0x2b, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000700)=""/130, 0x82}], 0x1}}], 0x1, 0x2020, 0x0) 01:30:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaa0d0000000000000023d5080800000000000000000000000000000000"], 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) recvfrom$inet6(r2, &(0x7f0000000040)=""/72, 0xfffffffffffffd62, 0x2001, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @empty, 0x101}, 0x15) openat$cgroup_int(r1, &(0x7f0000002340)='cpuset.memory_spread_page\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) openat$cgroup_ro(r1, &(0x7f00000003c0)='cpu.stat\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, 0x0, 0xfd47) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmmsg(r4, &(0x7f0000001d40)=[{{&(0x7f0000000240)=@l2, 0x80, &(0x7f0000000980)=[{&(0x7f00000004c0)=""/108, 0x6c}, {&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f0000000340)=""/56, 0x38}, {&(0x7f0000000840)=""/170, 0xaa}, {&(0x7f0000000900)=""/103, 0x67}], 0x5}, 0x188573df}, {{&(0x7f0000001a40)=@ipx, 0x80, &(0x7f0000001c80)=[{0x0}, {&(0x7f0000001bc0)=""/37, 0x25}, {&(0x7f0000001c00)=""/98, 0x62}], 0x3, &(0x7f0000001cc0)=""/81, 0x51}, 0x200}], 0x2, 0x2000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000240)='GPL\x00', 0x2, 0x2e6, &(0x7f00001a7f05)=""/251}, 0x48) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x4031, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0xf76925ac}, 0x0) recvmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r4, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x4c, &(0x7f0000000000), 0xf}, 0x0) r5 = socket(0x1000100000009, 0x5, 0x1266) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) syz_genetlink_get_family_id$team(&(0x7f0000001540)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x1000004}, 0xc, &(0x7f0000001600)={&(0x7f0000000400)=ANY=[@ANYRES32=r7], 0x1}}, 0x40011) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r5, 0x29, 0xd2, &(0x7f0000000540)={{0xa, 0x100000004e24, 0xd0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e21, 0x0, @local}, 0x4, [0x8, 0x9, 0x0, 0x0, 0x58f2, 0x6, 0xfffffffffffffffa, 0x7]}, 0x5c) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") r9 = socket(0x400020000000010, 0x2, 0x0) write(r9, &(0x7f0000000080)="1f00000054000d0000000000fc07ff1b070404000d00000007000100010039", 0x1f) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x89a2, &(0x7f0000000040)={'bridge0\x00', r7}) 01:30:13 executing program 0: r0 = accept(0xffffffffffffff9c, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x7c774aac) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000a00)={0x0, {{0xa, 0x4e23, 0x8, @empty, 0x3}}, {{0xa, 0x4e22, 0x3, @local, 0x7f}}}, 0x108) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r1, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x507000, 0x1000007, 0x2013, r1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000180)='bcsf0\x00\x00\x00\x00\x00\x00\x00\x11\x00') setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) [ 177.510090][ C0] net_ratelimit: 8 callbacks suppressed [ 177.510111][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 177.528664][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 177.541458][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 177.554283][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 177.567083][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 177.579922][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 177.592706][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) 01:30:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaa0d0000000000000023d5080800000000000000000000000000000000"], 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) recvfrom$inet6(r2, &(0x7f0000000040)=""/72, 0xfffffffffffffd62, 0x2001, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @empty, 0x101}, 0x15) openat$cgroup_int(r1, &(0x7f0000002340)='cpuset.memory_spread_page\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) openat$cgroup_ro(r1, &(0x7f00000003c0)='cpu.stat\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, 0x0, 0xfd47) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmmsg(r4, &(0x7f0000001d40)=[{{&(0x7f0000000240)=@l2, 0x80, &(0x7f0000000980)=[{&(0x7f00000004c0)=""/108, 0x6c}, {&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f0000000340)=""/56, 0x38}, {&(0x7f0000000840)=""/170, 0xaa}, {&(0x7f0000000900)=""/103, 0x67}], 0x5}, 0x188573df}, {{&(0x7f0000001a40)=@ipx, 0x80, &(0x7f0000001c80)=[{0x0}, {&(0x7f0000001bc0)=""/37, 0x25}, {&(0x7f0000001c00)=""/98, 0x62}], 0x3, &(0x7f0000001cc0)=""/81, 0x51}, 0x200}], 0x2, 0x2000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000240)='GPL\x00', 0x2, 0x2e6, &(0x7f00001a7f05)=""/251}, 0x48) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x4031, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0xf76925ac}, 0x0) recvmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r4, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x4c, &(0x7f0000000000), 0xf}, 0x0) r5 = socket(0x1000100000009, 0x5, 0x1266) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) syz_genetlink_get_family_id$team(&(0x7f0000001540)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x1000004}, 0xc, &(0x7f0000001600)={&(0x7f0000000400)=ANY=[@ANYRES32=r7], 0x1}}, 0x40011) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r5, 0x29, 0xd2, &(0x7f0000000540)={{0xa, 0x100000004e24, 0xd0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e21, 0x0, @local}, 0x4, [0x8, 0x9, 0x0, 0x0, 0x58f2, 0x6, 0xfffffffffffffffa, 0x7]}, 0x5c) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") r9 = socket(0x400020000000010, 0x2, 0x0) write(r9, &(0x7f0000000080)="1f00000054000d0000000000fc07ff1b070404000d00000007000100010039", 0x1f) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x89a2, &(0x7f0000000040)={'bridge0\x00', r7}) 01:30:13 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x10000000004e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) 01:30:13 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) openat$cgroup_ro(r0, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/61, 0x3d}}], 0x1, 0x0, 0x0) readv(r1, &(0x7f00000002c0), 0x1a5) [ 177.605692][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 177.619609][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 177.632355][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) 01:30:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 177.726516][ T9895] PF_BRIDGE: br_mdb_parse() with invalid attr 01:30:14 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x10000000004e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) 01:30:14 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) openat$cgroup_ro(r0, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/61, 0x3d}}], 0x1, 0x0, 0x0) readv(r1, &(0x7f00000002c0), 0x1a5) [ 177.932564][ T9910] PF_BRIDGE: br_mdb_parse() with invalid attr 01:30:14 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x10000000004e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) 01:30:14 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@delsa={0x3c, 0x11, 0x95180b15fede04ab, 0x0, 0x0, {@in6=@remote, 0x0, 0x2}, [@srcaddr={0x14, 0xd, @in6=@ipv4}]}, 0x3c}}, 0x0) 01:30:14 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x10000000004e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) 01:30:14 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@delsa={0x3c, 0x11, 0x95180b15fede04ab, 0x0, 0x0, {@in6=@remote, 0x0, 0x2}, [@srcaddr={0x14, 0xd, @in6=@ipv4}]}, 0x3c}}, 0x0) 01:30:15 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@delsa={0x3c, 0x11, 0x95180b15fede04ab, 0x0, 0x0, {@in6=@remote, 0x0, 0x2}, [@srcaddr={0x14, 0xd, @in6=@ipv4}]}, 0x3c}}, 0x0) 01:30:15 executing program 0: r0 = accept(0xffffffffffffff9c, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x7c774aac) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000a00)={0x0, {{0xa, 0x4e23, 0x8, @empty, 0x3}}, {{0xa, 0x4e22, 0x3, @local, 0x7f}}}, 0x108) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r1, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x507000, 0x1000007, 0x2013, r1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000180)='bcsf0\x00\x00\x00\x00\x00\x00\x00\x11\x00') setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 01:30:15 executing program 2: sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100), 0xce) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x800000000003, 0x3) ioctl$FS_IOC_GETFSLABEL(r0, 0x400452c8, &(0x7f0000000100)) 01:30:15 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) openat$cgroup_ro(r0, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/61, 0x3d}}], 0x1, 0x0, 0x0) readv(r1, &(0x7f00000002c0), 0x1a5) 01:30:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000140)={'bond0\x00\x00\x00T\x00\x00\x00\x00\x01\x00', @ifru_names='bond0\x00'}) 01:30:15 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@delsa={0x3c, 0x11, 0x95180b15fede04ab, 0x0, 0x0, {@in6=@remote, 0x0, 0x2}, [@srcaddr={0x14, 0xd, @in6=@ipv4}]}, 0x3c}}, 0x0) 01:30:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaa0d0000000000000023d5080800000000000000000000000000000000"], 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) recvfrom$inet6(r2, &(0x7f0000000040)=""/72, 0xfffffffffffffd62, 0x2001, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @empty, 0x101}, 0x15) openat$cgroup_int(r1, &(0x7f0000002340)='cpuset.memory_spread_page\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) openat$cgroup_ro(r1, &(0x7f00000003c0)='cpu.stat\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, 0x0, 0xfd47) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmmsg(r4, &(0x7f0000001d40)=[{{&(0x7f0000000240)=@l2, 0x80, &(0x7f0000000980)=[{&(0x7f00000004c0)=""/108, 0x6c}, {&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f0000000340)=""/56, 0x38}, {&(0x7f0000000840)=""/170, 0xaa}, {&(0x7f0000000900)=""/103, 0x67}], 0x5}, 0x188573df}, {{&(0x7f0000001a40)=@ipx, 0x80, &(0x7f0000001c80)=[{0x0}, {&(0x7f0000001bc0)=""/37, 0x25}, {&(0x7f0000001c00)=""/98, 0x62}], 0x3, &(0x7f0000001cc0)=""/81, 0x51}, 0x200}], 0x2, 0x2000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000240)='GPL\x00', 0x2, 0x2e6, &(0x7f00001a7f05)=""/251}, 0x48) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x4031, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0xf76925ac}, 0x0) recvmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r4, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x4c, &(0x7f0000000000), 0xf}, 0x0) r5 = socket(0x1000100000009, 0x5, 0x1266) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) syz_genetlink_get_family_id$team(&(0x7f0000001540)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x1000004}, 0xc, &(0x7f0000001600)={&(0x7f0000000400)=ANY=[@ANYRES32=r7], 0x1}}, 0x40011) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r5, 0x29, 0xd2, &(0x7f0000000540)={{0xa, 0x100000004e24, 0xd0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e21, 0x0, @local}, 0x4, [0x8, 0x9, 0x0, 0x0, 0x58f2, 0x6, 0xfffffffffffffffa, 0x7]}, 0x5c) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") r9 = socket(0x400020000000010, 0x2, 0x0) write(r9, &(0x7f0000000080)="1f00000054000d0000000000fc07ff1b070404000d00000007000100010039", 0x1f) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x89a2, &(0x7f0000000040)={'bridge0\x00', r7}) [ 179.101200][ T9945] bond0: cannot enslave bond to itself. 01:30:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000140)={'bond0\x00\x00\x00T\x00\x00\x00\x00\x01\x00', @ifru_names='bond0\x00'}) 01:30:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xb6\x0fTA\x16jwl\x1a\x92% \x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0e\x167F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xccGc\xf2\x0fs\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xecy\x8c \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x87l\x9b\xacn\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf3\x1d\x84\xb8\x9b\x8d\xed\xfd\x9fSO\x87\xa1-\xcbbK\xdc\xaf\x8bSL\xb3n\xdc\xdd\x05\xc7\x16n\xa4\xcb\xdb\xf6\x06\'\xa8\x8f\x14\xf6\xf6\xc0\nm\x03\xb7\xc3\xe8+2\x9f\x06\x00\x85\xb7\xc0u\xd8^\x86\xe6\x93\xeeM\xc1\x8cH\x1d\x9f/Wt\xe5\x9cUf\xd7\x04c\xb7z\x8cW\b\xb3\xf70x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@loopback, @ipv4={[], [], @multicast2}, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0fe, r1}) 01:30:18 executing program 1: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0xfcda) setsockopt$inet_int(r0, 0x0, 0xd, &(0x7f0000000080)=0x6, 0x4) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000000)=0x8000000935, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000440)=""/175, 0xaf}], 0x1) [ 182.039263][T10069] raw_sendmsg: syz-executor.1 forgot to set AF_INET. Fix it! [ 182.519438][ C0] net_ratelimit: 6225 callbacks suppressed [ 182.519455][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 182.537932][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 182.550474][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 182.562869][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 182.575584][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d6:c7:b8:9d:42:61, vlan:0) [ 182.591942][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 182.605710][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 182.620236][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 182.629336][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 182.633501][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) 01:30:19 executing program 3: r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000080)="2400000020002551071c0165ff91fc020200000000100f000ee1000c08000b0000000000", 0x24) 01:30:19 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539esp(ctr(serpent),md5-generic)\x00'}, 0x58) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0x9}, 0x68) 01:30:19 executing program 5: r0 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000400)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xed\x1f', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@loopback, @ipv4={[], [], @multicast2}, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0fe, r1}) 01:30:19 executing program 1: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0xfcda) setsockopt$inet_int(r0, 0x0, 0xd, &(0x7f0000000080)=0x6, 0x4) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000000)=0x8000000935, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000440)=""/175, 0xaf}], 0x1) 01:30:19 executing program 2: socket$inet6(0xa, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000002c0), 0x12) sendfile(r1, r1, &(0x7f0000002580), 0x7fffffff) sendfile(r1, r1, &(0x7f0000000240), 0x8000) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") 01:30:19 executing program 0: socket$inet6(0xa, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000002c0), 0x12) sendfile(r1, r1, &(0x7f0000002580), 0x7fffffff) sendfile(r1, r1, &(0x7f0000000240), 0x8000) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") 01:30:19 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539esp(ctr(serpent),md5-generic)\x00'}, 0x58) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0x9}, 0x68) 01:30:19 executing program 5: r0 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000400)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xed\x1f', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@loopback, @ipv4={[], [], @multicast2}, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0fe, r1}) 01:30:19 executing program 1: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0xfcda) setsockopt$inet_int(r0, 0x0, 0xd, &(0x7f0000000080)=0x6, 0x4) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000000)=0x8000000935, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000440)=""/175, 0xaf}], 0x1) 01:30:19 executing program 3: r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000080)="2400000020002551071c0165ff91fc020200000000100f000ee1000c08000b0000000000", 0x24) 01:30:19 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539esp(ctr(serpent),md5-generic)\x00'}, 0x58) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0x9}, 0x68) 01:30:19 executing program 5: r0 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000400)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xed\x1f', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@loopback, @ipv4={[], [], @multicast2}, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0fe, r1}) 01:30:19 executing program 1: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0xfcda) setsockopt$inet_int(r0, 0x0, 0xd, &(0x7f0000000080)=0x6, 0x4) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000000)=0x8000000935, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000440)=""/175, 0xaf}], 0x1) 01:30:19 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000100)="240000000a0a07041dfffd946fa2830020200a0009000108000000680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 01:30:19 executing program 2: socket$inet6(0xa, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000002c0), 0x12) sendfile(r1, r1, &(0x7f0000002580), 0x7fffffff) sendfile(r1, r1, &(0x7f0000000240), 0x8000) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") 01:30:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffd2) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x631c2bdc, 0x7fffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x10076) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000240)={0x0, r2, 0x40}) 01:30:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") unshare(0x8000400) r1 = socket$pppoe(0x18, 0x1, 0x0) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000280), &(0x7f00000002c0)=0x8) 01:30:20 executing program 0: socket$inet6(0xa, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000002c0), 0x12) sendfile(r1, r1, &(0x7f0000002580), 0x7fffffff) sendfile(r1, r1, &(0x7f0000000240), 0x8000) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") 01:30:20 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000100)="240000000a0a07041dfffd946fa2830020200a0009000108000000680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 01:30:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") unshare(0x8000400) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x0, @dev}}}, 0x9c) 01:30:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") unshare(0x8000400) r1 = socket$pppoe(0x18, 0x1, 0x0) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000280), &(0x7f00000002c0)=0x8) 01:30:20 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000100)="240000000a0a07041dfffd946fa2830020200a0009000108000000680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 01:30:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffd2) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x631c2bdc, 0x7fffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x10076) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000240)={0x0, r2, 0x40}) 01:30:20 executing program 2: socket$inet6(0xa, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000002c0), 0x12) sendfile(r1, r1, &(0x7f0000002580), 0x7fffffff) sendfile(r1, r1, &(0x7f0000000240), 0x8000) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") 01:30:20 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000100)="240000000a0a07041dfffd946fa2830020200a0009000108000000680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 01:30:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") unshare(0x8000400) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x0, @dev}}}, 0x9c) 01:30:20 executing program 3: pipe(&(0x7f0000000c80)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000100)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000300), &(0x7f0000000380)=0x8) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000640)="0adc1f123c123f3188b070") socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000840)=0x200) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000040}, 0xc, &(0x7f0000000480)={&(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000040)) ioctl(r2, 0x4, &(0x7f0000000b40)="988a97a3b7d8c2535f03e4ac752b30a5c57bb33d4c1bab0000000000104cf9ecd5c6d2895650241ef100000000000000000000f1a585aaeadc9eea308609458b58f10c5750d45b4ab91628c161f1cff44e20a2702eb065c60cee11e09804ba055a8b0b3f4c8bc4eace299111a3dd91f41d9e6cddccd15d432b4425cdb8e8a0e0bb3505507105222c1fd8695fd3827f1015d1cda55ec2af0c4500586cffd4131037dd640084ed966ef2436583eeecab25aad5fa266285f68627f1faf78310737e23cc677640f096746c2392d1f3e8a07f81b5949d69168fbb6b3743bcbae625fb452f1bf29117ff26ae6a5f608d77cd4d") getsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f0000000500)=""/195, &(0x7f0000000180)=0xc3) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) syz_emit_ethernet(0x30, &(0x7f0000000140)={@broadcast, @local, [], {@x25={0x805, {0x2, 0x9, 0x1f, "f0148e6c6e47c9871bfec2a7a6d19c182d57ba2c39753a9a8a43fff333b55e"}}}}, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_group_source_req(r6, 0x0, 0x2f, &(0x7f00000001c0)={0xffffffffffffffab, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @remote}}}, 0x108) tee(r0, r5, 0x7ffffffd, 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000017, &(0x7f00000003c0)=0x1, 0x4) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f0000000080)='bond_slave_1\x00') setsockopt$inet_tcp_int(r6, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xffffff41) getsockopt$bt_hci(r6, 0x0, 0x2, &(0x7f00000009c0)=""/67, &(0x7f0000000000)=0x43) setsockopt$inet_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f0000000740)={@in={{0x2, 0x4e24, @local}}, 0x4267, 0x7ff, 0x0, "d96c3f946ed0ea097730dc2f70e8f5365e84c42a65714fdabb7f0d889f8264ad5cf26238e5006617b68cdc3155b88b34fb49c40fb8a20054659001abcf1e791c53073309016edc6fe5ecf08eaa542109"}, 0xd8) r7 = socket(0x400000000010, 0x3, 0x0) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) 01:30:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") unshare(0x8000400) r1 = socket$pppoe(0x18, 0x1, 0x0) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000280), &(0x7f00000002c0)=0x8) 01:30:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffd2) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x631c2bdc, 0x7fffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x10076) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000240)={0x0, r2, 0x40}) 01:30:21 executing program 0: socket$inet6(0xa, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000002c0), 0x12) sendfile(r1, r1, &(0x7f0000002580), 0x7fffffff) sendfile(r1, r1, &(0x7f0000000240), 0x8000) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") 01:30:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") unshare(0x8000400) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x0, @dev}}}, 0x9c) 01:30:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@getqdisc={0x24, 0x26, 0x30b}, 0x24}}, 0x0) recvmmsg(r0, &(0x7f0000009e80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000002280)=[{&(0x7f0000000d80)=""/69, 0x45}, {&(0x7f0000000e00)=""/242, 0xf2}, {&(0x7f0000000f40)=""/4096, 0x1000}, {&(0x7f0000001f40)=""/95, 0x5f}, {&(0x7f0000001fc0)=""/216, 0xd8}, {&(0x7f00000020c0)=""/88, 0x58}, {&(0x7f0000002140)=""/249, 0xf9}], 0x7}}], 0x2, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)=@getqdisc={0x24, 0x26, 0x317}, 0x24}}, 0x0) 01:30:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") unshare(0x8000400) r1 = socket$pppoe(0x18, 0x1, 0x0) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000280), &(0x7f00000002c0)=0x8) 01:30:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") unshare(0x8000400) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x0, @dev}}}, 0x9c) 01:30:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffd2) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x631c2bdc, 0x7fffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x10076) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000240)={0x0, r2, 0x40}) 01:30:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f000000d379)={&(0x7f0000000200)={0x14, 0x14, 0x301, 0x0, 0x0, {0x1e}}, 0x14}}, 0x0) 01:30:22 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, 0x0, 0x0) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 01:30:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(serpent-generic))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) [ 187.528945][ C1] net_ratelimit: 15797 callbacks suppressed [ 187.528960][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 187.530655][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 187.535191][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 187.547134][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 187.559419][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 187.570957][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 187.583008][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 187.595468][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 187.607181][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 187.618817][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 188.458163][T10245] IPVS: ftp: loaded support on port[0] = 21 [ 189.370490][T10245] chnl_net:caif_netlink_parms(): no params data found [ 189.474692][T10245] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.494646][T10245] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.502756][T10245] device bridge_slave_0 entered promiscuous mode [ 189.789090][T10245] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.796215][T10245] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.825928][T10245] device bridge_slave_1 entered promiscuous mode [ 189.880430][T10245] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 190.152407][T10245] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 190.205604][T10245] team0: Port device team_slave_0 added [ 190.221781][T10245] team0: Port device team_slave_1 added [ 190.580118][T10245] device hsr_slave_0 entered promiscuous mode [ 190.641985][T10245] device hsr_slave_1 entered promiscuous mode [ 190.691968][ T9079] device veth0_to_bridge left promiscuous mode [ 190.699593][ T9079] bridge0: port 3(veth0_to_bridge) entered disabled state [ 190.803389][ T9079] device bridge_slave_1 left promiscuous mode [ 190.822255][ T9079] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.913263][ T9079] device bridge_slave_0 left promiscuous mode [ 190.940925][ T9079] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.538868][ C1] net_ratelimit: 20247 callbacks suppressed [ 192.538884][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 192.542551][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 192.545443][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 192.557076][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 192.569085][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 192.580997][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 192.593252][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 192.604906][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:f4:29:30:49:21, vlan:0) [ 192.616908][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 192.628770][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 197.548860][ C1] net_ratelimit: 19508 callbacks suppressed [ 197.548875][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 197.548948][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 197.555373][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 197.567060][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 197.579027][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 197.590906][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 197.603187][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 197.614854][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:f4:29:30:49:21, vlan:0) [ 197.626854][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 197.638683][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 197.765818][ T9079] device hsr_slave_1 left promiscuous mode [ 197.855711][ T9079] device hsr_slave_0 left promiscuous mode [ 197.949574][ T9079] team0 (unregistering): Port device team_slave_1 removed [ 198.015237][ T9079] team0 (unregistering): Port device team_slave_0 removed [ 198.056255][ T9079] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 198.153764][ T9079] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 198.389347][ T9079] bond0 (unregistering): Released all slaves [ 199.031275][T10245] 8021q: adding VLAN 0 to HW filter on device bond0 [ 199.045007][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 199.060460][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 199.095577][T10245] 8021q: adding VLAN 0 to HW filter on device team0 [ 199.113514][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 199.130058][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 199.139559][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.146657][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.202642][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 199.242007][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 199.272829][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 199.295068][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.302940][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.317963][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 199.346827][T10245] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 199.399679][T10245] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 199.421494][ T2635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 199.431332][ T2635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 199.460585][ T2635] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 199.469700][ T2635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 199.478586][ T2635] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 199.516980][ T2635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 199.532897][ T2635] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 199.554907][ T2635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 199.585167][ T2635] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 199.668645][ T7788] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 199.677004][ T7788] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 199.718962][T10245] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 199.981849][T10253] device lo entered promiscuous mode 01:30:36 executing program 3: pipe(&(0x7f0000000c80)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000100)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000300), &(0x7f0000000380)=0x8) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000640)="0adc1f123c123f3188b070") socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000840)=0x200) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000040}, 0xc, &(0x7f0000000480)={&(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000040)) ioctl(r2, 0x4, &(0x7f0000000b40)="988a97a3b7d8c2535f03e4ac752b30a5c57bb33d4c1bab0000000000104cf9ecd5c6d2895650241ef100000000000000000000f1a585aaeadc9eea308609458b58f10c5750d45b4ab91628c161f1cff44e20a2702eb065c60cee11e09804ba055a8b0b3f4c8bc4eace299111a3dd91f41d9e6cddccd15d432b4425cdb8e8a0e0bb3505507105222c1fd8695fd3827f1015d1cda55ec2af0c4500586cffd4131037dd640084ed966ef2436583eeecab25aad5fa266285f68627f1faf78310737e23cc677640f096746c2392d1f3e8a07f81b5949d69168fbb6b3743bcbae625fb452f1bf29117ff26ae6a5f608d77cd4d") getsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f0000000500)=""/195, &(0x7f0000000180)=0xc3) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) syz_emit_ethernet(0x30, &(0x7f0000000140)={@broadcast, @local, [], {@x25={0x805, {0x2, 0x9, 0x1f, "f0148e6c6e47c9871bfec2a7a6d19c182d57ba2c39753a9a8a43fff333b55e"}}}}, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_group_source_req(r6, 0x0, 0x2f, &(0x7f00000001c0)={0xffffffffffffffab, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @remote}}}, 0x108) tee(r0, r5, 0x7ffffffd, 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000017, &(0x7f00000003c0)=0x1, 0x4) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f0000000080)='bond_slave_1\x00') setsockopt$inet_tcp_int(r6, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xffffff41) getsockopt$bt_hci(r6, 0x0, 0x2, &(0x7f00000009c0)=""/67, &(0x7f0000000000)=0x43) setsockopt$inet_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f0000000740)={@in={{0x2, 0x4e24, @local}}, 0x4267, 0x7ff, 0x0, "d96c3f946ed0ea097730dc2f70e8f5365e84c42a65714fdabb7f0d889f8264ad5cf26238e5006617b68cdc3155b88b34fb49c40fb8a20054659001abcf1e791c53073309016edc6fe5ecf08eaa542109"}, 0xd8) r7 = socket(0x400000000010, 0x3, 0x0) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) 01:30:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000070a07041dfffd946fa2830020200a0009000108000000680c1baba20400ff7e28000000110affffba16a0aa1c0009b356da5a80d18b0400000000000000db2406b208d37ed01cc0", 0x4c}], 0x1}, 0x0) 01:30:36 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000008a00)=[{{0x0, 0xfffffffffffffec6, &(0x7f0000000540)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000000680)=""/120, 0x78}, {&(0x7f0000000400)=""/230, 0xffffff6f}], 0x3}}], 0x4000246, 0x0, &(0x7f0000008bc0)) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) 01:30:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) socket$kcm(0x29, 0x2, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x23, 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000006c0)={'raw\x00', 0x2, [{}, {}]}, 0x48) epoll_create1(0x0) write(r1, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d947c066f43deffde579ddb806eec71ac710404185f9", 0xbe) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000580)=0x7c9) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000c40)=0x1, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000480)={0x0, 0x5}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r2, &(0x7f0000000540)=0x4) sendfile(r1, r1, &(0x7f0000000080), 0x7ffffffb) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000b00)=0x8) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f00000005c0)=""/246, &(0x7f0000000300)=0xf6) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') sendmsg$nfc_llcp(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x27, 0x1, 0x1, 0x2, 0xfff, 0x2, "bfaa7055ae12cd918b9186b6b6c9e7aa7f7ace52d9b9620bf09f28398c6995d1b848d71ceb4c39d9acdc3b6fc2eecbf25b7233899441db45f4ca9f6afd5045"}, 0x60, 0x0}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000a80)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000a40)}, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x8000) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) socket$inet_udp(0x2, 0x2, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) write$binfmt_script(r0, &(0x7f0000000780)={'#! ', './file0', [{0x20, '\''}, {0x20, 'em1em1('}, {0x20, '('}, {0x20, 'team\x00'}], 0xa, "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"}, 0x132) 01:30:36 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, 0x0, 0x0) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 01:30:36 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000040)=@null) [ 200.141295][T10260] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 01:30:36 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000040)=@null) 01:30:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000070a07041dfffd946fa2830020200a0009000108000000680c1baba20400ff7e28000000110affffba16a0aa1c0009b356da5a80d18b0400000000000000db2406b208d37ed01cc0", 0x4c}], 0x1}, 0x0) 01:30:36 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, 0x0, 0x0) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 01:30:36 executing program 3: pipe(&(0x7f0000000c80)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000100)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000300), &(0x7f0000000380)=0x8) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000640)="0adc1f123c123f3188b070") socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000840)=0x200) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000040}, 0xc, &(0x7f0000000480)={&(0x7f0000000880)=ANY=[@ANYBLOB="1003290600000000000000000000f23688ff3a5325ee2000010000000000000000000000000000bb04000000200002000a004e204f0e000000000000000000000000000000000001090000003c0002000800030005000000080003003f00000008000100050000000800020006000000080001000c00000008000200050000000800010010000000102001006574683a64756d6d023000000c00010000180001006574683a76657468305f746f5f7465616d00e8ff08000300080000002896ed61cf11df9b094563076c8c4e3510e49c6c70716687c4cf6d51bd137318b9df47f685a6e18e8887636efead761ebb2f358f29f617f2e87cb7de3407e435130223c60e5097544bbe56651a868910e718838095164d6f449e54e682b7265a73d51cd0726f7c000000000000000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000040)) ioctl(r2, 0x4, &(0x7f0000000b40)="988a97a3b7d8c2535f03e4ac752b30a5c57bb33d4c1bab0000000000104cf9ecd5c6d2895650241ef100000000000000000000f1a585aaeadc9eea308609458b58f10c5750d45b4ab91628c161f1cff44e20a2702eb065c60cee11e09804ba055a8b0b3f4c8bc4eace299111a3dd91f41d9e6cddccd15d432b4425cdb8e8a0e0bb3505507105222c1fd8695fd3827f1015d1cda55ec2af0c4500586cffd4131037dd640084ed966ef2436583eeecab25aad5fa266285f68627f1faf78310737e23cc677640f096746c2392d1f3e8a07f81b5949d69168fbb6b3743bcbae625fb452f1bf29117ff26ae6a5f608d77cd4d") getsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f0000000500)=""/195, &(0x7f0000000180)=0xc3) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) syz_emit_ethernet(0x30, &(0x7f0000000140)={@broadcast, @local, [], {@x25={0x805, {0x2, 0x9, 0x1f, "f0148e6c6e47c9871bfec2a7a6d19c182d57ba2c39753a9a8a43fff333b55e"}}}}, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_group_source_req(r6, 0x0, 0x2f, &(0x7f00000001c0)={0xffffffffffffffab, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @remote}}}, 0x108) tee(r0, r5, 0x7ffffffd, 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000017, &(0x7f00000003c0)=0x1, 0x4) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f0000000080)='bond_slave_1\x00') setsockopt$inet_tcp_int(r6, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xffffff41) getsockopt$bt_hci(r6, 0x0, 0x2, &(0x7f00000009c0)=""/67, &(0x7f0000000000)=0x43) setsockopt$inet_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f0000000740)={@in={{0x2, 0x4e24, @local}}, 0x4267, 0x7ff, 0x0, "d96c3f946ed0ea097730dc2f70e8f5365e84c42a65714fdabb7f0d889f8264ad5cf26238e5006617b68cdc3155b88b34fb49c40fb8a20054659001abcf1e791c53073309016edc6fe5ecf08eaa542109"}, 0xd8) r7 = socket(0x400000000010, 0x3, 0x0) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) 01:30:36 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000040)=@null) [ 200.455339][T10277] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 01:30:36 executing program 3: pipe(&(0x7f0000000c80)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000100)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000300), &(0x7f0000000380)=0x8) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000640)="0adc1f123c123f3188b070") socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000840)=0x200) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000040}, 0xc, &(0x7f0000000480)={&(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000040)) ioctl(r2, 0x4, &(0x7f0000000b40)="988a97a3b7d8c2535f03e4ac752b30a5c57bb33d4c1bab0000000000104cf9ecd5c6d2895650241ef100000000000000000000f1a585aaeadc9eea308609458b58f10c5750d45b4ab91628c161f1cff44e20a2702eb065c60cee11e09804ba055a8b0b3f4c8bc4eace299111a3dd91f41d9e6cddccd15d432b4425cdb8e8a0e0bb3505507105222c1fd8695fd3827f1015d1cda55ec2af0c4500586cffd4131037dd640084ed966ef2436583eeecab25aad5fa266285f68627f1faf78310737e23cc677640f096746c2392d1f3e8a07f81b5949d69168fbb6b3743bcbae625fb452f1bf29117ff26ae6a5f608d77cd4d") getsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f0000000500)=""/195, &(0x7f0000000180)=0xc3) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) syz_emit_ethernet(0x30, &(0x7f0000000140)={@broadcast, @local, [], {@x25={0x805, {0x2, 0x9, 0x1f, "f0148e6c6e47c9871bfec2a7a6d19c182d57ba2c39753a9a8a43fff333b55e"}}}}, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_group_source_req(r6, 0x0, 0x2f, &(0x7f00000001c0)={0xffffffffffffffab, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @remote}}}, 0x108) tee(r0, r5, 0x7ffffffd, 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000017, &(0x7f00000003c0)=0x1, 0x4) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f0000000080)='bond_slave_1\x00') setsockopt$inet_tcp_int(r6, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xffffff41) getsockopt$bt_hci(r6, 0x0, 0x2, &(0x7f00000009c0)=""/67, &(0x7f0000000000)=0x43) setsockopt$inet_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f0000000740)={@in={{0x2, 0x4e24, @local}}, 0x4267, 0x7ff, 0x0, "d96c3f946ed0ea097730dc2f70e8f5365e84c42a65714fdabb7f0d889f8264ad5cf26238e5006617b68cdc3155b88b34fb49c40fb8a20054659001abcf1e791c53073309016edc6fe5ecf08eaa542109"}, 0xd8) r7 = socket(0x400000000010, 0x3, 0x0) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) 01:30:36 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000040)=@null) 01:30:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000070a07041dfffd946fa2830020200a0009000108000000680c1baba20400ff7e28000000110affffba16a0aa1c0009b356da5a80d18b0400000000000000db2406b208d37ed01cc0", 0x4c}], 0x1}, 0x0) [ 200.797941][T10293] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 01:30:37 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000008a00)=[{{0x0, 0xfffffffffffffec6, &(0x7f0000000540)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000000680)=""/120, 0x78}, {&(0x7f0000000400)=""/230, 0xffffff6f}], 0x3}}], 0x4000246, 0x0, &(0x7f0000008bc0)) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) 01:30:37 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cgroup.max.descendants\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000001200)=ANY=[@ANYBLOB='-3'], 0x2) 01:30:37 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, 0x0, 0x0) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 01:30:37 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x3, [{{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}]}, 0x210) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000080)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff01000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) 01:30:37 executing program 5: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffee1, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000001240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000001380), 0x0, &(0x7f00000013c0)=""/70, 0x46}, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000040)={0x4, &(0x7f0000000600)=[{}, {}, {}, {}]}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) ppoll(&(0x7f0000000500)=[{r1, 0x2103}], 0x1, &(0x7f0000000580)={0x0, r2+10000000}, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, 0x0, &(0x7f00000004c0)) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000b00), &(0x7f0000000b40)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, &(0x7f0000002740)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000002840)={0x0, 0x785e12a1, 0x30}, &(0x7f0000002880)=0xc) sendmmsg$inet_sctp(r3, 0x0, 0x0, 0xc000) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 01:30:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000070a07041dfffd946fa2830020200a0009000108000000680c1baba20400ff7e28000000110affffba16a0aa1c0009b356da5a80d18b0400000000000000db2406b208d37ed01cc0", 0x4c}], 0x1}, 0x0) [ 201.160961][T10309] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 01:30:37 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x48, &(0x7f0000f68000)={@mcast1}, 0x25f) 01:30:37 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cgroup.max.descendants\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000001200)=ANY=[@ANYBLOB='-3'], 0x2) 01:30:37 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cgroup.max.descendants\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000001200)=ANY=[@ANYBLOB='-3'], 0x2) 01:30:37 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cgroup.max.descendants\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000001200)=ANY=[@ANYBLOB='-3'], 0x2) 01:30:37 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x48, &(0x7f0000f68000)={@mcast1}, 0x25f) 01:30:37 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) recvmmsg(r0, &(0x7f0000002240)=[{{&(0x7f00000000c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000240)=""/209, 0xd1}}, {{0x0, 0x0, &(0x7f0000002140)=[{0xfffffffffffffffd}], 0x1, &(0x7f00000021c0)=""/124, 0x7c}}], 0x2, 0x0, &(0x7f0000002380)={0x0, 0x989680}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) 01:30:38 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000008a00)=[{{0x0, 0xfffffffffffffec6, &(0x7f0000000540)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000000680)=""/120, 0x78}, {&(0x7f0000000400)=""/230, 0xffffff6f}], 0x3}}], 0x4000246, 0x0, &(0x7f0000008bc0)) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) 01:30:38 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cgroup.max.descendants\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000001200)=ANY=[@ANYBLOB='-3'], 0x2) 01:30:38 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x48, &(0x7f0000f68000)={@mcast1}, 0x25f) 01:30:38 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cgroup.max.descendants\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000001200)=ANY=[@ANYBLOB='-3'], 0x2) [ 202.558912][ C1] net_ratelimit: 15059 callbacks suppressed [ 202.558930][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 202.559069][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 202.565571][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 202.578791][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 202.590655][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 202.602490][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 202.614975][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 202.626736][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 202.638543][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 202.651225][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 207.569064][ C1] net_ratelimit: 17051 callbacks suppressed [ 207.569079][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 207.569139][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 207.575279][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 207.587234][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 207.599576][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 207.611262][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 207.623290][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 207.635260][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:f4:29:30:49:21, vlan:0) [ 207.647596][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 207.659176][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 01:30:44 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cgroup.max.descendants\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000001200)=ANY=[@ANYBLOB='-3'], 0x2) 01:30:44 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) recvmmsg(r0, &(0x7f0000002240)=[{{&(0x7f00000000c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000240)=""/209, 0xd1}}, {{0x0, 0x0, &(0x7f0000002140)=[{0xfffffffffffffffd}], 0x1, &(0x7f00000021c0)=""/124, 0x7c}}], 0x2, 0x0, &(0x7f0000002380)={0x0, 0x989680}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) 01:30:44 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x48, &(0x7f0000f68000)={@mcast1}, 0x25f) 01:30:44 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) recvmmsg(r0, &(0x7f0000002240)=[{{&(0x7f00000000c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000240)=""/209, 0xd1}}, {{0x0, 0x0, &(0x7f0000002140)=[{0xfffffffffffffffd}], 0x1, &(0x7f00000021c0)=""/124, 0x7c}}], 0x2, 0x0, &(0x7f0000002380)={0x0, 0x989680}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) 01:30:44 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000008a00)=[{{0x0, 0xfffffffffffffec6, &(0x7f0000000540)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000000680)=""/120, 0x78}, {&(0x7f0000000400)=""/230, 0xffffff6f}], 0x3}}], 0x4000246, 0x0, &(0x7f0000008bc0)) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) 01:30:44 executing program 5: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffee1, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000001240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000001380), 0x0, &(0x7f00000013c0)=""/70, 0x46}, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000040)={0x4, &(0x7f0000000600)=[{}, {}, {}, {}]}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) ppoll(&(0x7f0000000500)=[{r1, 0x2103}], 0x1, &(0x7f0000000580)={0x0, r2+10000000}, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, 0x0, &(0x7f00000004c0)) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000b00), &(0x7f0000000b40)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, &(0x7f0000002740)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000002840)={0x0, 0x785e12a1, 0x30}, &(0x7f0000002880)=0xc) sendmmsg$inet_sctp(r3, 0x0, 0x0, 0xc000) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 01:30:44 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) recvmmsg(r0, &(0x7f0000002240)=[{{&(0x7f00000000c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000240)=""/209, 0xd1}}, {{0x0, 0x0, &(0x7f0000002140)=[{0xfffffffffffffffd}], 0x1, &(0x7f00000021c0)=""/124, 0x7c}}], 0x2, 0x0, &(0x7f0000002380)={0x0, 0x989680}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) 01:30:44 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) recvmmsg(r0, &(0x7f0000002240)=[{{&(0x7f00000000c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000240)=""/209, 0xd1}}, {{0x0, 0x0, &(0x7f0000002140)=[{0xfffffffffffffffd}], 0x1, &(0x7f00000021c0)=""/124, 0x7c}}], 0x2, 0x0, &(0x7f0000002380)={0x0, 0x989680}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) 01:30:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x10, @ipv4=@multicast1=0x1000000}]}]}, 0x24}}, 0x0) 01:30:44 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) recvmmsg(r0, &(0x7f0000002240)=[{{&(0x7f00000000c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000240)=""/209, 0xd1}}, {{0x0, 0x0, &(0x7f0000002140)=[{0xfffffffffffffffd}], 0x1, &(0x7f00000021c0)=""/124, 0x7c}}], 0x2, 0x0, &(0x7f0000002380)={0x0, 0x989680}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) 01:30:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000500)={0x48, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x34, 0x18, [@generic="93f7e147cdcfa5b33bb43ee685d5ac892aae39ee4fdf087c1ecfc987e7a656c32d2336622f8cee227d8bbfedc7"]}]}, 0x48}}, 0x0) 01:30:44 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) recvmmsg(r0, &(0x7f0000002240)=[{{&(0x7f00000000c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000240)=""/209, 0xd1}}, {{0x0, 0x0, &(0x7f0000002140)=[{0xfffffffffffffffd}], 0x1, &(0x7f00000021c0)=""/124, 0x7c}}], 0x2, 0x0, &(0x7f0000002380)={0x0, 0x989680}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) 01:30:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x10, @ipv4=@multicast1=0x1000000}]}]}, 0x24}}, 0x0) 01:30:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000500)={0x48, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x34, 0x18, [@generic="93f7e147cdcfa5b33bb43ee685d5ac892aae39ee4fdf087c1ecfc987e7a656c32d2336622f8cee227d8bbfedc7"]}]}, 0x48}}, 0x0) 01:30:44 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) recvmmsg(r0, &(0x7f0000000040)=[{{&(0x7f0000002400)=@l2, 0x80, &(0x7f00000037c0)=[{&(0x7f0000001300)=""/4096, 0x1000}], 0x1, &(0x7f0000003840)=""/78, 0x4e}}], 0x4000000000000a7, 0x40010000, 0x0) sendto$inet(r0, &(0x7f0000000e40), 0x0, 0x0, &(0x7f00000004c0)={0x2, 0x0, @loopback}, 0x10) 01:30:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x10, @ipv4=@multicast1=0x1000000}]}]}, 0x24}}, 0x0) 01:30:44 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) recvmmsg(r0, &(0x7f0000000040)=[{{&(0x7f0000002400)=@l2, 0x80, &(0x7f00000037c0)=[{&(0x7f0000001300)=""/4096, 0x1000}], 0x1, &(0x7f0000003840)=""/78, 0x4e}}], 0x4000000000000a7, 0x40010000, 0x0) sendto$inet(r0, &(0x7f0000000e40), 0x0, 0x0, &(0x7f00000004c0)={0x2, 0x0, @loopback}, 0x10) 01:30:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000500)={0x48, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x34, 0x18, [@generic="93f7e147cdcfa5b33bb43ee685d5ac892aae39ee4fdf087c1ecfc987e7a656c32d2336622f8cee227d8bbfedc7"]}]}, 0x48}}, 0x0) 01:30:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="81e00ffa8692a44c460f2b107c82920746a0504bd8e71f86d062d5f6411c6c9c5692e3f1092600013d993ad2e1fd4661", 0x30}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000006180)=[{{0x0, 0x0, &(0x7f0000002480)=[{&(0x7f0000001480)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 01:30:48 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x10, @ipv4=@multicast1=0x1000000}]}]}, 0x24}}, 0x0) 01:30:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3e, &(0x7f0000499000)=""/35, &(0x7f000020a000)=0x23) 01:30:48 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) recvmmsg(r0, &(0x7f0000000040)=[{{&(0x7f0000002400)=@l2, 0x80, &(0x7f00000037c0)=[{&(0x7f0000001300)=""/4096, 0x1000}], 0x1, &(0x7f0000003840)=""/78, 0x4e}}], 0x4000000000000a7, 0x40010000, 0x0) sendto$inet(r0, &(0x7f0000000e40), 0x0, 0x0, &(0x7f00000004c0)={0x2, 0x0, @loopback}, 0x10) 01:30:48 executing program 5: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffee1, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000001240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000001380), 0x0, &(0x7f00000013c0)=""/70, 0x46}, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000040)={0x4, &(0x7f0000000600)=[{}, {}, {}, {}]}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) ppoll(&(0x7f0000000500)=[{r1, 0x2103}], 0x1, &(0x7f0000000580)={0x0, r2+10000000}, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, 0x0, &(0x7f00000004c0)) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000b00), &(0x7f0000000b40)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, &(0x7f0000002740)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000002840)={0x0, 0x785e12a1, 0x30}, &(0x7f0000002880)=0xc) sendmmsg$inet_sctp(r3, 0x0, 0x0, 0xc000) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 01:30:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000500)={0x48, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x34, 0x18, [@generic="93f7e147cdcfa5b33bb43ee685d5ac892aae39ee4fdf087c1ecfc987e7a656c32d2336622f8cee227d8bbfedc7"]}]}, 0x48}}, 0x0) 01:30:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3e, &(0x7f0000499000)=""/35, &(0x7f000020a000)=0x23) 01:30:48 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) recvmmsg(r0, &(0x7f0000000040)=[{{&(0x7f0000002400)=@l2, 0x80, &(0x7f00000037c0)=[{&(0x7f0000001300)=""/4096, 0x1000}], 0x1, &(0x7f0000003840)=""/78, 0x4e}}], 0x4000000000000a7, 0x40010000, 0x0) sendto$inet(r0, &(0x7f0000000e40), 0x0, 0x0, &(0x7f00000004c0)={0x2, 0x0, @loopback}, 0x10) 01:30:48 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="5500000018007f1412fe01b2a4a280930a06000000a84306910000000b000f0035020000060000001900154004000001d40000dc1338d54400009b84136ef75afb83de44110016000d0006000000060cec4faba7d4", 0x55}], 0x1}, 0x0) [ 212.199151][T10453] netlink: 'syz-executor.3': attribute type 15 has an invalid length. 01:30:48 executing program 4: r0 = socket(0x400000000010, 0x3, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") write(r0, &(0x7f0000000e00)="2400000021002551075c0165ff0ffc020200000000100f0007e1000c0800180016000000bc0000008f3943793a5ea67658cb22d90000000000000059b97dc8f8b550e66a2bbf77c4931da84157f7a733686a22fd8169f6b6b4f464e0c05df670d851f785ea2b85d32b3583d87124da3bb0b9e2cc000000dcce1fb4ac2cbd48c8378a3ad82a5b83c01295723da595c4831f65123819e204853d48a5a6bd525801d5cae983cf4544a9c4c396f36e85787a8efc32e0015c85ead2b748bc6a5fefc4e53543f9f65e3da31a110af1acb78ce510c7a70723741b34981d1b182deb7904", 0xe0) [ 212.296965][T10453] netlink: 'syz-executor.3': attribute type 21 has an invalid length. 01:30:48 executing program 2: r0 = socket$inet6(0xa, 0x100000803, 0x2b) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000017, 0x0) [ 212.374610][T10453] netlink: 'syz-executor.3': attribute type 6 has an invalid length. 01:30:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f000000e240)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) readv(r1, &(0x7f00000007c0)=[{&(0x7f00000001c0)=""/104, 0x34910}], 0x1) [ 212.579031][ C0] net_ratelimit: 15318 callbacks suppressed [ 212.579060][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 212.597349][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 212.609702][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 212.611471][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 212.622024][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:f4:29:30:49:21, vlan:0) [ 212.633953][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 212.645877][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 212.658629][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 212.670494][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 212.682485][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) 01:30:49 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000100)) 01:30:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3e, &(0x7f0000499000)=""/35, &(0x7f000020a000)=0x23) 01:30:49 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="5500000018007f1412fe01b2a4a280930a06000000a84306910000000b000f0035020000060000001900154004000001d40000dc1338d54400009b84136ef75afb83de44110016000d0006000000060cec4faba7d4", 0x55}], 0x1}, 0x0) 01:30:49 executing program 2: r0 = socket$inet6(0xa, 0x100000803, 0x2b) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000017, 0x0) [ 212.819248][T10491] netlink: 'syz-executor.3': attribute type 15 has an invalid length. [ 212.853705][T10491] netlink: 'syz-executor.3': attribute type 21 has an invalid length. [ 212.889127][T10491] netlink: 'syz-executor.3': attribute type 6 has an invalid length. 01:30:52 executing program 5: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffee1, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000001240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000001380), 0x0, &(0x7f00000013c0)=""/70, 0x46}, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000040)={0x4, &(0x7f0000000600)=[{}, {}, {}, {}]}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) ppoll(&(0x7f0000000500)=[{r1, 0x2103}], 0x1, &(0x7f0000000580)={0x0, r2+10000000}, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, 0x0, &(0x7f00000004c0)) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000b00), &(0x7f0000000b40)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, &(0x7f0000002740)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000002840)={0x0, 0x785e12a1, 0x30}, &(0x7f0000002880)=0xc) sendmmsg$inet_sctp(r3, 0x0, 0x0, 0xc000) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 01:30:52 executing program 2: r0 = socket$inet6(0xa, 0x100000803, 0x2b) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000017, 0x0) 01:30:52 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x4, &(0x7f00000000c0)={r0, &(0x7f0000000080)}, 0xf) 01:30:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3e, &(0x7f0000499000)=""/35, &(0x7f000020a000)=0x23) 01:30:52 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="5500000018007f1412fe01b2a4a280930a06000000a84306910000000b000f0035020000060000001900154004000001d40000dc1338d54400009b84136ef75afb83de44110016000d0006000000060cec4faba7d4", 0x55}], 0x1}, 0x0) 01:30:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f000000e240)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) readv(r1, &(0x7f00000007c0)=[{&(0x7f00000001c0)=""/104, 0x34910}], 0x1) 01:30:52 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x0, 0x4}, 0x4) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100), 0x4) [ 216.140280][T10510] netlink: 'syz-executor.3': attribute type 15 has an invalid length. [ 216.167070][T10510] netlink: 'syz-executor.3': attribute type 21 has an invalid length. 01:30:52 executing program 2: r0 = socket$inet6(0xa, 0x100000803, 0x2b) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000017, 0x0) [ 216.226762][T10510] netlink: 'syz-executor.3': attribute type 6 has an invalid length. 01:30:52 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="5500000018007f1412fe01b2a4a280930a06000000a84306910000000b000f0035020000060000001900154004000001d40000dc1338d54400009b84136ef75afb83de44110016000d0006000000060cec4faba7d4", 0x55}], 0x1}, 0x0) 01:30:52 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040), 0x0) [ 216.449231][T10532] netlink: 'syz-executor.3': attribute type 15 has an invalid length. 01:30:52 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040), 0x0) 01:30:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r0, 0x0, 0x420000a77, 0x0) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0xfffffd88) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000080)) close(r1) [ 217.588889][ C0] net_ratelimit: 15471 callbacks suppressed [ 217.588904][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 217.588998][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 217.595063][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 217.607281][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 217.619181][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 217.631495][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 217.643176][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:f4:29:30:49:21, vlan:0) [ 217.655555][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 217.667382][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 217.679773][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) 01:30:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r0, 0x0, 0x420000a77, 0x0) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0xfffffd88) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000080)) close(r1) 01:30:56 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0xff00000000000000, 0x0, 0x66}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'}, 0x48) 01:30:56 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040), 0x0) 01:30:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") unshare(0x20400) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f00000000c0)={0x80000001}, 0x2) 01:30:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f000000e240)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) readv(r1, &(0x7f00000007c0)=[{&(0x7f00000001c0)=""/104, 0x34910}], 0x1) 01:30:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket(0xa, 0x803, 0x6) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0xfffffffffffffeff}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 01:30:57 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)={0x2, 0x400040000000003, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x2]}}}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x70}}, 0x0) 01:30:57 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040), 0x0) 01:30:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket(0xa, 0x803, 0x6) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0xfffffffffffffeff}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 01:30:57 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x10, 0x4, 0x4, 0x100000001, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) 01:30:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket(0xa, 0x803, 0x6) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0xfffffffffffffeff}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 01:30:57 executing program 0: r0 = accept(0xffffffffffffff9c, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) unshare(0x60000000) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, 0x0) getsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, 0x0, 0x0) getuid() getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000240)={'HL\x00'}, &(0x7f0000000340)=0x1e) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200408c0) syz_genetlink_get_family_id$team(0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000002c0)={0x0, 0x3, 0x2, 0x760}, &(0x7f0000000300)=0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000002fc0)={'nr0\x00'}) getsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000001040)={@empty, @local}, &(0x7f0000000080)=0xfffffffffffffede) getsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, &(0x7f00000000c0)) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000480)={0x0, 0x81}, 0xc) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="00040000800072dd08"], 0x1}}, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000600)='TIPC\x00') r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r2, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) sendmsg$nl_route_sched(r0, 0x0, 0x800) [ 221.237323][T10586] IPVS: ftp: loaded support on port[0] = 21 01:30:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r0, 0x0, 0x420000a77, 0x0) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0xfffffd88) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000080)) close(r1) 01:30:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) getpid() recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000003f40)=""/190, 0xbe}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x228, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 01:30:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket(0xa, 0x803, 0x6) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0xfffffffffffffeff}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 221.568085][T10588] IPVS: ftp: loaded support on port[0] = 21 01:30:57 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x3) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @remote}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) sendto(r2, 0x0, 0x0, 0x44, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000140)=0x1000000000, 0x4) recvmmsg(r2, &(0x7f0000004e00)=[{{&(0x7f0000000680)=@nfc_llcp, 0x80, 0x0}}, {{&(0x7f0000000580)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000001340)=[{&(0x7f0000001180)=""/90, 0x5a}, {&(0x7f0000001200)=""/78, 0x4e}], 0x2, &(0x7f0000001380)=""/245, 0xf5}}], 0x2, 0x2, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000480)={@in6={{0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6}}, 0x0, 0x20, 0x0, "2681a759af559b030354ea5591345ed880f168c148bcc822bbe599b77d6287369bbea43679bb9b267d78589528c5b7596622c42c2870bdfd181a93eaa9f2facb846301de40ba6f7a883a90c39a7bf523"}, 0xd8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) vmsplice(r3, 0x0, 0x0, 0x0) clock_gettime(0x3, &(0x7f0000000340)) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0), &(0x7f0000000180)=0xb) recvmmsg(r0, 0x0, 0x0, 0x2140, 0x0) sendmmsg(r1, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) setsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000240), 0x4) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) write(r1, &(0x7f0000000100)="4a1a008016c5d20e77e9c8d0aa431ed0cff8cec800b54f847bfe31b520dbb9", 0x1f) 01:30:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f000000e240)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) readv(r1, &(0x7f00000007c0)=[{&(0x7f00000001c0)=""/104, 0x34910}], 0x1) 01:30:58 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote={0xac, 0x1c}, @local}, @igmp={0xb, 0x0, 0x0, @broadcast}}}}}, 0x0) [ 222.599076][ C1] net_ratelimit: 17427 callbacks suppressed [ 222.599091][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 222.609280][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 222.617327][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 222.629892][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 222.641897][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 222.653444][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 222.665373][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 222.677274][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 222.689631][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 222.701291][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:f4:29:30:49:21, vlan:0) 01:31:01 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x50, r1, 0x11, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'nr0\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x1}, 0x90) 01:31:01 executing program 0: r0 = accept(0xffffffffffffff9c, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) unshare(0x60000000) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, 0x0) getsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, 0x0, 0x0) getuid() getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000240)={'HL\x00'}, &(0x7f0000000340)=0x1e) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200408c0) syz_genetlink_get_family_id$team(0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000002c0)={0x0, 0x3, 0x2, 0x760}, &(0x7f0000000300)=0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000002fc0)={'nr0\x00'}) getsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000001040)={@empty, @local}, &(0x7f0000000080)=0xfffffffffffffede) getsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, &(0x7f00000000c0)) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000480)={0x0, 0x81}, 0xc) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="00040000800072dd08"], 0x1}}, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000600)='TIPC\x00') r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r2, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) sendmsg$nl_route_sched(r0, 0x0, 0x800) 01:31:01 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000200000002, &(0x7f00000002c0)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f65000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) 01:31:01 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) listen(r0, 0x0) accept(r0, &(0x7f0000001440)=@un=@abs, &(0x7f00000014c0)=0x80) 01:31:01 executing program 5: r0 = socket(0x11, 0x803, 0x300) r1 = socket$inet(0x2, 0x80003, 0x4) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") recvmmsg(r0, &(0x7f0000002e00), 0x386, 0x0, 0x0) 01:31:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r0, 0x0, 0x420000a77, 0x0) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0xfffffd88) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000080)) close(r1) [ 225.780793][T10635] IPVS: ftp: loaded support on port[0] = 21 01:31:02 executing program 4: unshare(0x6c060000) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xffffffffffffffff, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000001000)={0x0, 0x208000, 0x800}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x3, &(0x7f0000001040)=0x40, 0x4) socket$netlink(0x10, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e24, 0x7, @empty, 0xffffffffffff8000}}, 0x72, 0x7}, &(0x7f0000000100)=0x90) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={r3, 0x100}, &(0x7f0000000180)=0x8) 01:31:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x1d, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x10) [ 225.867190][T10650] validate_nla: 2 callbacks suppressed [ 225.867201][T10650] netlink: 'syz-executor.1': attribute type 8 has an invalid length. 01:31:02 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) recvmmsg(r1, &(0x7f00000086c0)=[{{0x0, 0x0, &(0x7f0000004040)=[{&(0x7f0000003f80)=""/162, 0xa2}], 0x1}}], 0x1, 0x0, 0x0) [ 226.009012][T10664] netlink: 'syz-executor.1': attribute type 8 has an invalid length. [ 226.027704][T10663] IPVS: ftp: loaded support on port[0] = 21 01:31:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_emit_ethernet(0x300cce, &(0x7f0000000080)={@local, @empty, [{}], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300008, 0x0, 0x0, @ipv4={[0x2, 0x2, 0x543, 0x0, 0xe80, 0x0, 0xe80], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 01:31:02 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r1, 0x439, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'caif0\x00'}]}]}, 0x3c}}, 0x0) 01:31:02 executing program 0: r0 = accept(0xffffffffffffff9c, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) unshare(0x60000000) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, 0x0) getsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, 0x0, 0x0) getuid() getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000240)={'HL\x00'}, &(0x7f0000000340)=0x1e) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200408c0) syz_genetlink_get_family_id$team(0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000002c0)={0x0, 0x3, 0x2, 0x760}, &(0x7f0000000300)=0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000002fc0)={'nr0\x00'}) getsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000001040)={@empty, @local}, &(0x7f0000000080)=0xfffffffffffffede) getsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, &(0x7f00000000c0)) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000480)={0x0, 0x81}, 0xc) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="00040000800072dd08"], 0x1}}, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000600)='TIPC\x00') r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r2, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) sendmsg$nl_route_sched(r0, 0x0, 0x800) 01:31:02 executing program 3: r0 = socket(0x400020000000010, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'syz_tun\x00', &(0x7f0000000080)=@ethtool_cmd={0x1f}}) [ 226.369720][T10682] IPVS: Error connecting to the multicast addr 01:31:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300008, 0x3c, 0x0, @ipv4={[0x0, 0x3], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 226.415623][T10684] IPVS: ftp: loaded support on port[0] = 21 [ 226.452322][T10687] IPVS: Error connecting to the multicast addr 01:31:02 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000180)={0xfc, {{0xa, 0x0, 0x0, @mcast2}}}, 0x90) 01:31:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000002c0)={'syz_tun\x00', &(0x7f0000002fc0)=@ethtool_cmd={0x1b, 0x4}}) 01:31:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x22, 0x74f44c59, 0x0, 0x0, {0x3}}, 0x14}, 0x1, 0x300}, 0x0) 01:31:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x12, 0x3, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xf, 0x57}}, &(0x7f0000000080)='M[Z\xf2\xa4\nf07\xc3Ju-\x01\xc2W\x88\x86\xe1=\x85-\xf6\xd3\xf2a|\xa6\x1f\x97\xbe?8\xec\x93\a[M-\xcc\b\xad\xceP9\x8a\xc40\x83\xd5\b\x1d\xc7o\xbb\xec\x87\xdf\xd4\x9c\xa7s\xbf\xfd\xdc\xc9\xffI\x82r\x90\x05\xb5\a\xec`VY\x94}\xbfMF\x84\xb9ZmFW\xe39+s\xa16\xff\xb5 \xa4d\x1bm=\xa2\xa1`\"\xaf\xe4\x9b\xd8\xcb\xb3\x82D\xc2\xa4>\xda\t\x00\x00\x00\x00\x00\x00\x7f\xd0/LS\xdf\xd4\xc7\x91S\xb7\x1f\f\xbe\xde4F+\x85\xb4\x97\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x1, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x8}, 0x48) [ 227.185011][T10666] IPVS: ftp: loaded support on port[0] = 21 [ 227.609074][ C0] net_ratelimit: 19762 callbacks suppressed [ 227.609090][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 227.609341][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 227.615454][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 227.627721][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 227.639745][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 227.651998][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 227.663679][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:f4:29:30:49:21, vlan:0) [ 227.675894][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 227.687741][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 227.700302][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) 01:31:04 executing program 4: unshare(0x6c060000) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xffffffffffffffff, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000001000)={0x0, 0x208000, 0x800}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x3, &(0x7f0000001040)=0x40, 0x4) socket$netlink(0x10, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e24, 0x7, @empty, 0xffffffffffff8000}}, 0x72, 0x7}, &(0x7f0000000100)=0x90) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={r3, 0x100}, &(0x7f0000000180)=0x8) 01:31:04 executing program 3: r0 = socket(0x848000000015, 0x805, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback={0xfe80000000000000}}, 0x1c) 01:31:04 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 01:31:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000002c0)={'syz_tun\x00', &(0x7f0000002fc0)=@ethtool_cmd={0x1b, 0x4}}) 01:31:04 executing program 2: socket$inet6(0xa, 0x3, 0xff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000040)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) socket$inet6_sctp(0xa, 0x1, 0x84) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000001d40)=[{{&(0x7f0000000240)=@l2, 0x80, &(0x7f0000000980)=[{&(0x7f0000000700)=""/176, 0xb0}, {&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f00000007c0)=""/121, 0x79}, {&(0x7f0000000340)=""/56, 0x38}, {&(0x7f0000000840)=""/170, 0xaa}, {&(0x7f0000000900)=""/103, 0x67}], 0x6}, 0x188573df}, {{&(0x7f0000001a40)=@ipx, 0x80, &(0x7f0000001c80)=[{0x0}, {&(0x7f0000001bc0)=""/37, 0x25}, {&(0x7f0000001c00)=""/98, 0x62}], 0x3, &(0x7f0000001cc0)=""/81, 0x51}, 0x200}], 0x2, 0x2000, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x4031, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0xf76925ac}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x4c, &(0x7f0000000000), 0xf}, 0x0) socket(0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x332) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xe, 0x0, &(0x7f00000003c0)) 01:31:04 executing program 0: r0 = accept(0xffffffffffffff9c, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) unshare(0x60000000) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, 0x0) getsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, 0x0, 0x0) getuid() getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000240)={'HL\x00'}, &(0x7f0000000340)=0x1e) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200408c0) syz_genetlink_get_family_id$team(0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000002c0)={0x0, 0x3, 0x2, 0x760}, &(0x7f0000000300)=0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000002fc0)={'nr0\x00'}) getsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000001040)={@empty, @local}, &(0x7f0000000080)=0xfffffffffffffede) getsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, &(0x7f00000000c0)) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000480)={0x0, 0x81}, 0xc) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="00040000800072dd08"], 0x1}}, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000600)='TIPC\x00') r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r2, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) sendmsg$nl_route_sched(r0, 0x0, 0x800) [ 228.473737][T10730] IPVS: ftp: loaded support on port[0] = 21 01:31:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$netlink(0x10, 0x3, 0x2000008000000004) recvmmsg(r1, &(0x7f0000005a40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x279}}], 0x75, 0x2, 0x0) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a067fbc45ff810040010000000058000b4824ca945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010004080800414900000004fcff", 0x58}], 0x1) [ 228.550016][T10737] IPVS: ftp: loaded support on port[0] = 21 01:31:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000002c0)={'syz_tun\x00', &(0x7f0000002fc0)=@ethtool_cmd={0x1b, 0x4}}) 01:31:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$netlink(0x10, 0x3, 0x2000008000000004) recvmmsg(r1, &(0x7f0000005a40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x279}}], 0x75, 0x2, 0x0) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a067fbc45ff810040010000000058000b4824ca945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010004080800414900000004fcff", 0x58}], 0x1) 01:31:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000002c0)={'syz_tun\x00', &(0x7f0000002fc0)=@ethtool_cmd={0x1b, 0x4}}) 01:31:05 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r3, 0x80047437, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x200010005, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) 01:31:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$netlink(0x10, 0x3, 0x2000008000000004) recvmmsg(r1, &(0x7f0000005a40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x279}}], 0x75, 0x2, 0x0) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a067fbc45ff810040010000000058000b4824ca945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010004080800414900000004fcff", 0x58}], 0x1) 01:31:06 executing program 4: unshare(0x6c060000) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xffffffffffffffff, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000001000)={0x0, 0x208000, 0x800}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x3, &(0x7f0000001040)=0x40, 0x4) socket$netlink(0x10, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e24, 0x7, @empty, 0xffffffffffff8000}}, 0x72, 0x7}, &(0x7f0000000100)=0x90) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={r3, 0x100}, &(0x7f0000000180)=0x8) 01:31:06 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x5, @link_local, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 01:31:06 executing program 2: socket$inet6(0xa, 0x3, 0xff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000040)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) socket$inet6_sctp(0xa, 0x1, 0x84) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000001d40)=[{{&(0x7f0000000240)=@l2, 0x80, &(0x7f0000000980)=[{&(0x7f0000000700)=""/176, 0xb0}, {&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f00000007c0)=""/121, 0x79}, {&(0x7f0000000340)=""/56, 0x38}, {&(0x7f0000000840)=""/170, 0xaa}, {&(0x7f0000000900)=""/103, 0x67}], 0x6}, 0x188573df}, {{&(0x7f0000001a40)=@ipx, 0x80, &(0x7f0000001c80)=[{0x0}, {&(0x7f0000001bc0)=""/37, 0x25}, {&(0x7f0000001c00)=""/98, 0x62}], 0x3, &(0x7f0000001cc0)=""/81, 0x51}, 0x200}], 0x2, 0x2000, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x4031, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0xf76925ac}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x4c, &(0x7f0000000000), 0xf}, 0x0) socket(0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x332) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xe, 0x0, &(0x7f00000003c0)) 01:31:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$netlink(0x10, 0x3, 0x2000008000000004) recvmmsg(r1, &(0x7f0000005a40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x279}}], 0x75, 0x2, 0x0) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a067fbc45ff810040010000000058000b4824ca945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010004080800414900000004fcff", 0x58}], 0x1) 01:31:06 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 230.350067][T10798] IPVS: ftp: loaded support on port[0] = 21 01:31:06 executing program 1: socket$rds(0x15, 0x5, 0x0) r0 = socket(0x2000010000000015, 0x5, 0x0) getsockopt(r0, 0x114, 0x2716, &(0x7f0000af0fe7)=""/13, &(0x7f0000000040)=0xf0) 01:31:06 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') socket$inet(0x2, 0x0, 0x0) r2 = socket(0x848000000015, 0x805, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') getsockopt(r2, 0x114, 0xf51, &(0x7f0000af0fe7)=""/13, &(0x7f0000000040)=0x67ce0fb380a77e9d) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) write$binfmt_script(r0, 0x0, 0x0) 01:31:06 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x5, @link_local, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 01:31:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x33, &(0x7f0000000000)={@remote}, 0x21) 01:31:07 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 01:31:07 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x5, @link_local, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 01:31:07 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00~\'\xfa\xd2\xf5\x92\xbbR\xa0\xe0g\xae]bJ\xc2\x85\xb8\xa8W\x92\xe7E0\xe2]\xc4\x1b\xed\xdc\xf7>$\xa5\xdb\xeaI\x81\x9a\x90,Z\xc6U\xb1y\xf9\xc3\x89\x86\xf3@\xfa\x89\xdd\xe9\xa3\x93\xe1\x84\xf8\xda\x0fu\xbe\x9a\x94H\xa6\xab\xfbfQvw\xb8\x05g\x1d\xfaiMH/~\'\xe7\xad\r]\x0e\xd6|x\x92\xf8\x0e\xfe\x87\xccag\xeb\x9a\b\x84\x0e\xff@g\xa7\x96/\x9f\a\x16\x04\xe6', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='cgroup.stat\x00\xb1L\xc1z\xd4\x8f\xd2ZN\xd3\x00&\xeeV\b\x06\x9f}\x93\xfef\xef\xc1kb\xa6\xf1 \x9dTY\xaa\xf5\x1e\xfar\xc4\xe5\xab\xac\xdc\xac\x98\xb0\x88\xb0\x16\xf5\xaf\xa9\xc3%\x14\x19\xde\xef\xb3\xa0$\xd2$\xcf4\xe8A\b\x84s\"x\xa9\x81X\xb4l\xa7\x8dv\n\xd1\x7f\xda\xc8\x87\x92\xb6\xee\n\xcb\x89#=\f\xa2\x12\xd12\xad7]\x1b\xf1\xdd\xa7\xdaq3hBe\xca\xa8\xbd\x8a\x00I\x11\x85\xd6%\x04\\;\x00\xda\xf7\xe0\xaem\xa8\x8d\t\xddB/\x84', 0x0, 0x0) preadv(r1, &(0x7f00000002c0)=[{&(0x7f0000000040)=""/18, 0x12}, {0x0, 0x2}], 0x2, 0x0) 01:31:08 executing program 4: unshare(0x6c060000) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xffffffffffffffff, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000001000)={0x0, 0x208000, 0x800}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x3, &(0x7f0000001040)=0x40, 0x4) socket$netlink(0x10, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e24, 0x7, @empty, 0xffffffffffff8000}}, 0x72, 0x7}, &(0x7f0000000100)=0x90) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={r3, 0x100}, &(0x7f0000000180)=0x8) 01:31:08 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x5, @link_local, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 01:31:08 executing program 2: socket$inet6(0xa, 0x3, 0xff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000040)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) socket$inet6_sctp(0xa, 0x1, 0x84) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000001d40)=[{{&(0x7f0000000240)=@l2, 0x80, &(0x7f0000000980)=[{&(0x7f0000000700)=""/176, 0xb0}, {&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f00000007c0)=""/121, 0x79}, {&(0x7f0000000340)=""/56, 0x38}, {&(0x7f0000000840)=""/170, 0xaa}, {&(0x7f0000000900)=""/103, 0x67}], 0x6}, 0x188573df}, {{&(0x7f0000001a40)=@ipx, 0x80, &(0x7f0000001c80)=[{0x0}, {&(0x7f0000001bc0)=""/37, 0x25}, {&(0x7f0000001c00)=""/98, 0x62}], 0x3, &(0x7f0000001cc0)=""/81, 0x51}, 0x200}], 0x2, 0x2000, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x4031, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0xf76925ac}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x4c, &(0x7f0000000000), 0xf}, 0x0) socket(0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x332) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xe, 0x0, &(0x7f00000003c0)) 01:31:08 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x8, 0x0, &(0x7f0000000180)) 01:31:08 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 232.626731][ C0] net_ratelimit: 10401 callbacks suppressed [ 232.626749][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 232.638076][T10871] IPVS: ftp: loaded support on port[0] = 21 [ 232.645843][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 232.660428][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 232.664296][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 232.682165][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 232.694637][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) 01:31:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xe, 0x3, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x57}}, &(0x7f0000000080)='M\x14%\x87Wo\xdb\xd4\xe5\x8c\xbe\xa3A\x7f\xa2[Z\xf2\xa4\nf07\xc3Ju-\x01\xc2W\x88\x86\xe1=\x85-\xf6\xd3\xf2a|\xa6\x1f\x97\xbe?8\xec\x93\a[\x03\x00\x00\x00\x00\x00\x00\x00\x8a\xc40\x83\xd5\b\x1d\xc7o\xbb\xec\x87\xdf\xd4\x9c\xa7s\xbf\xfd\xdc\xc9\xffI\x82r\x90\x05\xb5\a\xec`VY\x94}\xbfMF\x84xR+\xb9ZmFW\xe39+s\xa16\xff\xb5 \xa4d\x1bm=\xa2\xa1`\"\xaf\xe4\x9b\xd8\xcb\xb3\x82D\xc2\xa4>\xda\t\x00\x00\x00\x00\x00\x00\x7f\xd0/LS\xdf\xd4\xc7\x91S\xb7\x1f\f\xbe\xde\xccz\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x1, 0x99, &(0x7f0000000180)=""/153}, 0x48) [ 232.719093][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 232.731794][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 232.744271][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:f4:29:30:49:21, vlan:0) [ 232.756825][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 01:31:11 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') socket$inet(0x2, 0x0, 0x0) r2 = socket(0x848000000015, 0x805, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') getsockopt(r2, 0x114, 0xf51, &(0x7f0000af0fe7)=""/13, &(0x7f0000000040)=0x67ce0fb380a77e9d) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) write$binfmt_script(r0, 0x0, 0x0) 01:31:11 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e", 0x24}], 0x1}, 0x0) 01:31:11 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000040)={0x2}, 0x10) 01:31:11 executing program 2: socket$inet6(0xa, 0x3, 0xff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000040)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) socket$inet6_sctp(0xa, 0x1, 0x84) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000001d40)=[{{&(0x7f0000000240)=@l2, 0x80, &(0x7f0000000980)=[{&(0x7f0000000700)=""/176, 0xb0}, {&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f00000007c0)=""/121, 0x79}, {&(0x7f0000000340)=""/56, 0x38}, {&(0x7f0000000840)=""/170, 0xaa}, {&(0x7f0000000900)=""/103, 0x67}], 0x6}, 0x188573df}, {{&(0x7f0000001a40)=@ipx, 0x80, &(0x7f0000001c80)=[{0x0}, {&(0x7f0000001bc0)=""/37, 0x25}, {&(0x7f0000001c00)=""/98, 0x62}], 0x3, &(0x7f0000001cc0)=""/81, 0x51}, 0x200}], 0x2, 0x2000, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x4031, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0xf76925ac}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x4c, &(0x7f0000000000), 0xf}, 0x0) socket(0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x332) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xe, 0x0, &(0x7f00000003c0)) 01:31:11 executing program 1: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000300)={0x0, 0x0, 0x10}, 0xc) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 01:31:11 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) pread64(r2, &(0x7f00000004c0)=""/191, 0xbf, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2f, &(0x7f0000000240)={0x1, {{0xa, 0x4e20, 0x3, @ipv4={[], [], @loopback}, 0x3}}, {{0xa, 0x0, 0x3, @local, 0x84e}}}, 0x108) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r2, 0x80000000000) mmap(&(0x7f0000bdc000/0x2000)=nil, 0x2000, 0x1008007, 0x2013, r0, 0x2) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000700)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x1c, r3, 0x500, 0x70bd26, 0x25dfdbfc}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x4000) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x1076, 0x10000000) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000003c0)={0x0, 0x7fffffff}, 0x8) r4 = socket(0x2000400000000010, 0x2000000000000002, 0x0) write(r4, &(0x7f00000000c0)="2400000021002551075c0165ff0ffc020200000000100f0007e1000c0800100000000000", 0x24) socket$rds(0x15, 0x5, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) openat$cgroup(r1, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r6, 0x89a0, &(0x7f00000000c0)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r6, 0x89a1, &(0x7f0000000180)='b\x00') ioctl$FS_IOC_GETVERSION(r2, 0x80087601, 0x0) openat$cgroup_ro(r5, &(0x7f00000005c0)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000440)={0x800, 0x9, 0x0, 0x80000001, 0x20}) [ 237.629262][ C1] net_ratelimit: 13803 callbacks suppressed [ 237.629276][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 237.629635][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 237.635607][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 237.647544][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 237.659836][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 237.672219][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 237.684679][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 237.696597][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 237.708914][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 237.720527][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:f4:29:30:49:21, vlan:0) 01:31:15 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x80000000000000bd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)='s', 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) close(r2) 01:31:15 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000280)="000000000000bf22a4000000000000ddff0000000000000090a222b2fa9df5739fdcc7889ec9c65f1438", 0x2a, 0x8000, 0x0, 0x0) recvmmsg(r0, &(0x7f00000066c0)=[{{0x0, 0x0, &(0x7f0000001a00)=[{&(0x7f00000003c0)=""/234, 0xea}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000100)="f6951ba21d9d4b4680076a4a5b6a0000000000000000003a940000", 0x1b, 0x0, 0x0, 0x0) 01:31:15 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') socket$inet(0x2, 0x0, 0x0) r2 = socket(0x848000000015, 0x805, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') getsockopt(r2, 0x114, 0xf51, &(0x7f0000af0fe7)=""/13, &(0x7f0000000040)=0x67ce0fb380a77e9d) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) write$binfmt_script(r0, 0x0, 0x0) 01:31:15 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) pread64(r2, &(0x7f00000004c0)=""/191, 0xbf, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2f, &(0x7f0000000240)={0x1, {{0xa, 0x4e20, 0x3, @ipv4={[], [], @loopback}, 0x3}}, {{0xa, 0x0, 0x3, @local, 0x84e}}}, 0x108) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r2, 0x80000000000) mmap(&(0x7f0000bdc000/0x2000)=nil, 0x2000, 0x1008007, 0x2013, r0, 0x2) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000700)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x1c, r3, 0x500, 0x70bd26, 0x25dfdbfc}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x4000) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x1076, 0x10000000) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000003c0)={0x0, 0x7fffffff}, 0x8) r4 = socket(0x2000400000000010, 0x2000000000000002, 0x0) write(r4, &(0x7f00000000c0)="2400000021002551075c0165ff0ffc020200000000100f0007e1000c0800100000000000", 0x24) socket$rds(0x15, 0x5, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) openat$cgroup(r1, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r6, 0x89a0, &(0x7f00000000c0)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r6, 0x89a1, &(0x7f0000000180)='b\x00') ioctl$FS_IOC_GETVERSION(r2, 0x80087601, 0x0) openat$cgroup_ro(r5, &(0x7f00000005c0)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000440)={0x800, 0x9, 0x0, 0x80000001, 0x20}) 01:31:15 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) pread64(r2, &(0x7f00000004c0)=""/191, 0xbf, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2f, &(0x7f0000000240)={0x1, {{0xa, 0x4e20, 0x3, @ipv4={[], [], @loopback}, 0x3}}, {{0xa, 0x0, 0x3, @local, 0x84e}}}, 0x108) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r2, 0x80000000000) mmap(&(0x7f0000bdc000/0x2000)=nil, 0x2000, 0x1008007, 0x2013, r0, 0x2) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000700)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x1c, r3, 0x500, 0x70bd26, 0x25dfdbfc}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x4000) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x1076, 0x10000000) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000003c0)={0x0, 0x7fffffff}, 0x8) r4 = socket(0x2000400000000010, 0x2000000000000002, 0x0) write(r4, &(0x7f00000000c0)="2400000021002551075c0165ff0ffc020200000000100f0007e1000c0800100000000000", 0x24) socket$rds(0x15, 0x5, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) openat$cgroup(r1, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r6, 0x89a0, &(0x7f00000000c0)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r6, 0x89a1, &(0x7f0000000180)='b\x00') ioctl$FS_IOC_GETVERSION(r2, 0x80087601, 0x0) openat$cgroup_ro(r5, &(0x7f00000005c0)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000440)={0x800, 0x9, 0x0, 0x80000001, 0x20}) [ 238.879179][T10962] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 01:31:15 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x80000000000000bd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)='s', 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) close(r2) 01:31:15 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x80000000000000bd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)='s', 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) close(r2) 01:31:15 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x80000000000000bd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)='s', 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) close(r2) [ 242.638992][ C0] net_ratelimit: 17866 callbacks suppressed [ 242.639007][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 242.639292][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 242.645214][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 242.657158][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 242.669165][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:f4:29:30:49:21, vlan:0) [ 242.681513][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 242.693092][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 242.705337][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 242.717253][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 242.729469][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 247.648947][ C1] net_ratelimit: 22019 callbacks suppressed [ 247.648966][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 247.649146][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 247.655154][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 247.667068][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 247.683970][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 247.692585][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 247.704637][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 247.716569][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 247.728999][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 247.740597][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 01:31:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6c50400aeb995298992ea5600c2", 0x10) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x2e1, &(0x7f0000000e40)}], 0x8d9, 0x7ffff000) socket$inet6_udplite(0xa, 0x2, 0x88) 01:31:26 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0xc, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r1, 0x0, 0x80000001}, 0xc) 01:31:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f3188b070") bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x14}]}, &(0x7f0000000080)='GPL\x00'}, 0x48) 01:31:26 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') socket$inet(0x2, 0x0, 0x0) r2 = socket(0x848000000015, 0x805, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') getsockopt(r2, 0x114, 0xf51, &(0x7f0000af0fe7)=""/13, &(0x7f0000000040)=0x67ce0fb380a77e9d) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) write$binfmt_script(r0, 0x0, 0x0) 01:31:26 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) pread64(r2, &(0x7f00000004c0)=""/191, 0xbf, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2f, &(0x7f0000000240)={0x1, {{0xa, 0x4e20, 0x3, @ipv4={[], [], @loopback}, 0x3}}, {{0xa, 0x0, 0x3, @local, 0x84e}}}, 0x108) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r2, 0x80000000000) mmap(&(0x7f0000bdc000/0x2000)=nil, 0x2000, 0x1008007, 0x2013, r0, 0x2) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000700)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x1c, r3, 0x500, 0x70bd26, 0x25dfdbfc}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x4000) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x1076, 0x10000000) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000003c0)={0x0, 0x7fffffff}, 0x8) r4 = socket(0x2000400000000010, 0x2000000000000002, 0x0) write(r4, &(0x7f00000000c0)="2400000021002551075c0165ff0ffc020200000000100f0007e1000c0800100000000000", 0x24) socket$rds(0x15, 0x5, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) openat$cgroup(r1, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r6, 0x89a0, &(0x7f00000000c0)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r6, 0x89a1, &(0x7f0000000180)='b\x00') ioctl$FS_IOC_GETVERSION(r2, 0x80087601, 0x0) openat$cgroup_ro(r5, &(0x7f00000005c0)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000440)={0x800, 0x9, 0x0, 0x80000001, 0x20}) 01:31:26 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) pread64(r2, &(0x7f00000004c0)=""/191, 0xbf, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2f, &(0x7f0000000240)={0x1, {{0xa, 0x4e20, 0x3, @ipv4={[], [], @loopback}, 0x3}}, {{0xa, 0x0, 0x3, @local, 0x84e}}}, 0x108) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r2, 0x80000000000) mmap(&(0x7f0000bdc000/0x2000)=nil, 0x2000, 0x1008007, 0x2013, r0, 0x2) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000700)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x1c, r3, 0x500, 0x70bd26, 0x25dfdbfc}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x4000) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x1076, 0x10000000) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000003c0)={0x0, 0x7fffffff}, 0x8) r4 = socket(0x2000400000000010, 0x2000000000000002, 0x0) write(r4, &(0x7f00000000c0)="2400000021002551075c0165ff0ffc020200000000100f0007e1000c0800100000000000", 0x24) socket$rds(0x15, 0x5, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) openat$cgroup(r1, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r6, 0x89a0, &(0x7f00000000c0)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r6, 0x89a1, &(0x7f0000000180)='b\x00') ioctl$FS_IOC_GETVERSION(r2, 0x80087601, 0x0) openat$cgroup_ro(r5, &(0x7f00000005c0)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000440)={0x800, 0x9, 0x0, 0x80000001, 0x20}) 01:31:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket(0x100840000000002, 0x3, 0x1f) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x5a) connect$inet(r1, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) 01:31:26 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x4, 0x0, &(0x7f0000000180)) 01:31:26 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x2) write$binfmt_script(r0, 0x0, 0x0) setsockopt$inet6_dccp_buf(r0, 0x110, 0x1, 0x0, 0x3d1) 01:31:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6c50400aeb995298992ea5600c2", 0x10) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x2e1, &(0x7f0000000e40)}], 0x8d9, 0x7ffff000) socket$inet6_udplite(0xa, 0x2, 0x88) 01:31:27 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000280)=ANY=[], 0xfffffffc) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) splice(r0, 0x0, r3, 0x0, 0x20000000002, 0x0) 01:31:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6c50400aeb995298992ea5600c2", 0x10) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x2e1, &(0x7f0000000e40)}], 0x8d9, 0x7ffff000) socket$inet6_udplite(0xa, 0x2, 0x88) 01:31:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6c50400aeb995298992ea5600c2", 0x10) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x2e1, &(0x7f0000000e40)}], 0x8d9, 0x7ffff000) socket$inet6_udplite(0xa, 0x2, 0x88) 01:31:27 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1e, r1, 0x805, 0x0, 0x0, {{}, 0x0, 0x400b, 0x0, {0x14}}}, 0x30}}, 0x0) 01:31:28 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000280)=ANY=[], 0xfffffffc) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) splice(r0, 0x0, r3, 0x0, 0x20000000002, 0x0) [ 252.658859][ C0] net_ratelimit: 18227 callbacks suppressed [ 252.658872][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:f4:29:30:49:21, vlan:0) [ 252.666950][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 252.677087][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 252.689104][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 252.700973][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 252.713097][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 252.725117][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 252.752900][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 252.764638][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 252.778019][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) 01:31:29 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1e, r1, 0x805, 0x0, 0x0, {{}, 0x0, 0x400b, 0x0, {0x14}}}, 0x30}}, 0x0) 01:31:29 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000280)=ANY=[], 0xfffffffc) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) splice(r0, 0x0, r3, 0x0, 0x20000000002, 0x0) 01:31:29 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) pread64(r2, &(0x7f00000004c0)=""/191, 0xbf, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2f, &(0x7f0000000240)={0x1, {{0xa, 0x4e20, 0x3, @ipv4={[], [], @loopback}, 0x3}}, {{0xa, 0x0, 0x3, @local, 0x84e}}}, 0x108) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r2, 0x80000000000) mmap(&(0x7f0000bdc000/0x2000)=nil, 0x2000, 0x1008007, 0x2013, r0, 0x2) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000700)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x1c, r3, 0x500, 0x70bd26, 0x25dfdbfc}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x4000) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x1076, 0x10000000) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000003c0)={0x0, 0x7fffffff}, 0x8) r4 = socket(0x2000400000000010, 0x2000000000000002, 0x0) write(r4, &(0x7f00000000c0)="2400000021002551075c0165ff0ffc020200000000100f0007e1000c0800100000000000", 0x24) socket$rds(0x15, 0x5, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) openat$cgroup(r1, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r6, 0x89a0, &(0x7f00000000c0)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r6, 0x89a1, &(0x7f0000000180)='b\x00') ioctl$FS_IOC_GETVERSION(r2, 0x80087601, 0x0) openat$cgroup_ro(r5, &(0x7f00000005c0)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000440)={0x800, 0x9, 0x0, 0x80000001, 0x20}) 01:31:29 executing program 2: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x4, 0x5c832, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) pwritev(r2, &(0x7f0000000100)=[{&(0x7f0000000200)="f7", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f0000000180)) splice(r0, 0x0, r3, 0x0, 0x100000000000a, 0x0) 01:31:29 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) pread64(r2, &(0x7f00000004c0)=""/191, 0xbf, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2f, &(0x7f0000000240)={0x1, {{0xa, 0x4e20, 0x3, @ipv4={[], [], @loopback}, 0x3}}, {{0xa, 0x0, 0x3, @local, 0x84e}}}, 0x108) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r2, 0x80000000000) mmap(&(0x7f0000bdc000/0x2000)=nil, 0x2000, 0x1008007, 0x2013, r0, 0x2) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000700)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x1c, r3, 0x500, 0x70bd26, 0x25dfdbfc}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x4000) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x1076, 0x10000000) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000003c0)={0x0, 0x7fffffff}, 0x8) r4 = socket(0x2000400000000010, 0x2000000000000002, 0x0) write(r4, &(0x7f00000000c0)="2400000021002551075c0165ff0ffc020200000000100f0007e1000c0800100000000000", 0x24) socket$rds(0x15, 0x5, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) openat$cgroup(r1, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r6, 0x89a0, &(0x7f00000000c0)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r6, 0x89a1, &(0x7f0000000180)='b\x00') ioctl$FS_IOC_GETVERSION(r2, 0x80087601, 0x0) openat$cgroup_ro(r5, &(0x7f00000005c0)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000440)={0x800, 0x9, 0x0, 0x80000001, 0x20}) 01:31:29 executing program 3: r0 = socket(0x22, 0x2, 0x4) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x0, 0x4) 01:31:29 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1e, r1, 0x805, 0x0, 0x0, {{}, 0x0, 0x400b, 0x0, {0x14}}}, 0x30}}, 0x0) 01:31:29 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8084, &(0x7f0000000040)={0x2, 0x4e20}, 0x10) sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x14}, 0x14}}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000)=0x6, 0x4) recvfrom$inet(r0, &(0x7f0000002100)=""/90, 0x5a, 0x3, 0x0, 0x0) 01:31:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1e, r1, 0x805, 0x0, 0x0, {{}, 0x0, 0x400b, 0x0, {0x14}}}, 0x30}}, 0x0) [ 253.765387][T11129] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 01:31:30 executing program 0: accept4$tipc(0xffffffffffffff9c, 0x0, &(0x7f0000000240), 0x80800) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000251c88e8cd9056dd5c7ef700000000000000000000000000001700000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x97) pipe(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000340)={0x20}) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) pwrite64(r0, &(0x7f00000003c0)=' ', 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x10076) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000004c0)=0x8, 0x4) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=0x0, &(0x7f0000000140)=0x4) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={0x0, 0xca}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000440)={0x0, 0x20, 0x2, 0xd14a, 0x4, 0x100, 0x1, 0x80000000, r2}, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f00000002c0)=@generic={0x3, 0x80, 0x9}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x10000}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r2, 0x1}, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x2880008, r0, 0x0, 0xa}) 01:31:30 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x7) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000040)=0x2, 0x4) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000008c0), &(0x7f0000000900)=0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback, 0x3}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000500)={0x0, 0xc5, "9b3d19aa246de997060079cc757b62b7c4d06390ef2ca9f3ff553e756ae7a13a36396aaffeb12898816df73171f9676acddce64c739a4140e530fd336f0b0411be7a11beac97d24b5db5197c5ddb54e77d76ff924488a017ebcbd5684253787999b1262413631178dafb552a4588ec86dc042563b5d72348b7de8e89101814ae9194c275cfe540d7cc656e1ef0f68b62b96ccc28b74832cb865bdf97bd5d95608ac43250faaf160efe454b07ffc80463407bf58316d4cc9038706cd6803b7e9419b8a90ce2"}, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000640)={r2, 0x40, 0x1, [0x6]}, &(0x7f0000000680)=0xa) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x6, 0x810, r0, 0x0) r3 = accept(r0, 0x0, &(0x7f0000000740)) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f00000007c0)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x14, r4, 0xf10, 0x70bd29, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={r0}) getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, 0x0, &(0x7f0000000980)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r5, &(0x7f00000004c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10a000}, 0xc, &(0x7f0000000480)={&(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) [ 254.170235][T11145] sctp: [Deprecated]: syz-executor.3 (pid 11145) Use of int in max_burst socket option. [ 254.170235][T11145] Use struct sctp_assoc_value instead 01:31:30 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000280)=ANY=[], 0xfffffffc) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) splice(r0, 0x0, r3, 0x0, 0x20000000002, 0x0) [ 254.775498][T11143] sctp: [Deprecated]: syz-executor.3 (pid 11143) Use of int in max_burst socket option. [ 254.775498][T11143] Use struct sctp_assoc_value instead 01:31:31 executing program 2: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x4, 0x5c832, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) pwritev(r2, &(0x7f0000000100)=[{&(0x7f0000000200)="f7", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f0000000180)) splice(r0, 0x0, r3, 0x0, 0x100000000000a, 0x0) 01:31:31 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x7) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000040)=0x2, 0x4) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000008c0), &(0x7f0000000900)=0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback, 0x3}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000500)={0x0, 0xc5, "9b3d19aa246de997060079cc757b62b7c4d06390ef2ca9f3ff553e756ae7a13a36396aaffeb12898816df73171f9676acddce64c739a4140e530fd336f0b0411be7a11beac97d24b5db5197c5ddb54e77d76ff924488a017ebcbd5684253787999b1262413631178dafb552a4588ec86dc042563b5d72348b7de8e89101814ae9194c275cfe540d7cc656e1ef0f68b62b96ccc28b74832cb865bdf97bd5d95608ac43250faaf160efe454b07ffc80463407bf58316d4cc9038706cd6803b7e9419b8a90ce2"}, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000640)={r2, 0x40, 0x1, [0x6]}, &(0x7f0000000680)=0xa) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x6, 0x810, r0, 0x0) r3 = accept(r0, 0x0, &(0x7f0000000740)) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f00000007c0)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x14, r4, 0xf10, 0x70bd29, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={r0}) getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, 0x0, &(0x7f0000000980)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r5, &(0x7f00000004c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10a000}, 0xc, &(0x7f0000000480)={&(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) [ 255.111638][T11168] sctp: [Deprecated]: syz-executor.3 (pid 11168) Use of int in max_burst socket option. [ 255.111638][T11168] Use struct sctp_assoc_value instead 01:31:31 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x7) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000040)=0x2, 0x4) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000008c0), &(0x7f0000000900)=0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback, 0x3}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000500)={0x0, 0xc5, "9b3d19aa246de997060079cc757b62b7c4d06390ef2ca9f3ff553e756ae7a13a36396aaffeb12898816df73171f9676acddce64c739a4140e530fd336f0b0411be7a11beac97d24b5db5197c5ddb54e77d76ff924488a017ebcbd5684253787999b1262413631178dafb552a4588ec86dc042563b5d72348b7de8e89101814ae9194c275cfe540d7cc656e1ef0f68b62b96ccc28b74832cb865bdf97bd5d95608ac43250faaf160efe454b07ffc80463407bf58316d4cc9038706cd6803b7e9419b8a90ce2"}, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000640)={r2, 0x40, 0x1, [0x6]}, &(0x7f0000000680)=0xa) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x6, 0x810, r0, 0x0) r3 = accept(r0, 0x0, &(0x7f0000000740)) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f00000007c0)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x14, r4, 0xf10, 0x70bd29, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={r0}) getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, 0x0, &(0x7f0000000980)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r5, &(0x7f00000004c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10a000}, 0xc, &(0x7f0000000480)={&(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) 01:31:31 executing program 0: accept4$tipc(0xffffffffffffff9c, 0x0, &(0x7f0000000240), 0x80800) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000251c88e8cd9056dd5c7ef700000000000000000000000000001700000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x97) pipe(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000340)={0x20}) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) pwrite64(r0, &(0x7f00000003c0)=' ', 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x10076) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000004c0)=0x8, 0x4) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=0x0, &(0x7f0000000140)=0x4) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={0x0, 0xca}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000440)={0x0, 0x20, 0x2, 0xd14a, 0x4, 0x100, 0x1, 0x80000000, r2}, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f00000002c0)=@generic={0x3, 0x80, 0x9}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x10000}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r2, 0x1}, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x2880008, r0, 0x0, 0xa}) 01:31:31 executing program 5: accept4$tipc(0xffffffffffffff9c, 0x0, &(0x7f0000000240), 0x80800) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000251c88e8cd9056dd5c7ef700000000000000000000000000001700000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x97) pipe(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000340)={0x20}) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) pwrite64(r0, &(0x7f00000003c0)=' ', 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x10076) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000004c0)=0x8, 0x4) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=0x0, &(0x7f0000000140)=0x4) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={0x0, 0xca}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000440)={0x0, 0x20, 0x2, 0xd14a, 0x4, 0x100, 0x1, 0x80000000, r2}, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f00000002c0)=@generic={0x3, 0x80, 0x9}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x10000}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r2, 0x1}, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x2880008, r0, 0x0, 0xa}) [ 255.494313][T11178] sctp: [Deprecated]: syz-executor.4 (pid 11178) Use of int in max_burst socket option. [ 255.494313][T11178] Use struct sctp_assoc_value instead 01:31:31 executing program 1: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x4, 0x5c832, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) pwritev(r2, &(0x7f0000000100)=[{&(0x7f0000000200)="f7", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f0000000180)) splice(r0, 0x0, r3, 0x0, 0x100000000000a, 0x0) 01:31:32 executing program 2: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x4, 0x5c832, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) pwritev(r2, &(0x7f0000000100)=[{&(0x7f0000000200)="f7", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f0000000180)) splice(r0, 0x0, r3, 0x0, 0x100000000000a, 0x0) 01:31:32 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x7) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000040)=0x2, 0x4) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000008c0), &(0x7f0000000900)=0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback, 0x3}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000500)={0x0, 0xc5, "9b3d19aa246de997060079cc757b62b7c4d06390ef2ca9f3ff553e756ae7a13a36396aaffeb12898816df73171f9676acddce64c739a4140e530fd336f0b0411be7a11beac97d24b5db5197c5ddb54e77d76ff924488a017ebcbd5684253787999b1262413631178dafb552a4588ec86dc042563b5d72348b7de8e89101814ae9194c275cfe540d7cc656e1ef0f68b62b96ccc28b74832cb865bdf97bd5d95608ac43250faaf160efe454b07ffc80463407bf58316d4cc9038706cd6803b7e9419b8a90ce2"}, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000640)={r2, 0x40, 0x1, [0x6]}, &(0x7f0000000680)=0xa) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x6, 0x810, r0, 0x0) r3 = accept(r0, 0x0, &(0x7f0000000740)) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f00000007c0)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x14, r4, 0xf10, 0x70bd29, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={r0}) getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, 0x0, &(0x7f0000000980)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r5, &(0x7f00000004c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10a000}, 0xc, &(0x7f0000000480)={&(0x7f0000000180)=ANY=[@ANYBLOB="00002dbd7000fcdbdf251300000010000600040002000400020004000200f4000100240002000800020040e000000800040002000000080001001e000000080004000000000044000400200001000a004e23000005ba0000000000000000000000000000000157a60000200002000a004e240000007ffe8000000000000000000000000000aafdffffff08000300ff01000008000300ff000000080003000300000038000400200001000a004e220000003fff020000000000000000000000000001040000001400020002004e23ac1414150000000000000000380004001400010002004e24ac1414bb0000000000000000200002000a004e2200000017118f7bef7400180bfb749242708b42ddff01000080000100380004001400010002004e22ac1414bb0000000000000000200002000a004e2200008001a2c98ef8620a147b10d84616d5cdef03ff0100001800010069623a76657468315f746f5f626f6e64000000002c0004001400010002004e20ffffffff00000000000000001400020002004e240000000000000000000000009400050034000200080001001c000000080002000180000008000200090000000800040005000000080003002000000008000300810000004c000200080001001a000000080003000300000008000400060000000800040000000000080004000200000008000300fdffffff08000200020000000800040007000000080001000d00000008000100657468000800010069620000a00005001400020008000400ff0f0000080002000000000034000200080001000d0000000800040007000000080004000000008008000400000000000800040001000000080004000104000054000200080003000700000008000300010000000800030094f8ffff08000300ffff00000800010000000000080001000500000008000100110000000800040046ad701908000300010400000800040000000000"], 0x1}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) [ 256.078112][T11197] sctp: [Deprecated]: syz-executor.3 (pid 11197) Use of int in max_burst socket option. [ 256.078112][T11197] Use struct sctp_assoc_value instead 01:31:32 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x7) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000040)=0x2, 0x4) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000008c0), &(0x7f0000000900)=0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback, 0x3}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000500)={0x0, 0xc5, "9b3d19aa246de997060079cc757b62b7c4d06390ef2ca9f3ff553e756ae7a13a36396aaffeb12898816df73171f9676acddce64c739a4140e530fd336f0b0411be7a11beac97d24b5db5197c5ddb54e77d76ff924488a017ebcbd5684253787999b1262413631178dafb552a4588ec86dc042563b5d72348b7de8e89101814ae9194c275cfe540d7cc656e1ef0f68b62b96ccc28b74832cb865bdf97bd5d95608ac43250faaf160efe454b07ffc80463407bf58316d4cc9038706cd6803b7e9419b8a90ce2"}, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000640)={r2, 0x40, 0x1, [0x6]}, &(0x7f0000000680)=0xa) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x6, 0x810, r0, 0x0) r3 = accept(r0, 0x0, &(0x7f0000000740)) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f00000007c0)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x14, r4, 0xf10, 0x70bd29, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={r0}) getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, 0x0, &(0x7f0000000980)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r5, &(0x7f00000004c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10a000}, 0xc, &(0x7f0000000480)={&(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) 01:31:32 executing program 1: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x4, 0x5c832, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) pwritev(r2, &(0x7f0000000100)=[{&(0x7f0000000200)="f7", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f0000000180)) splice(r0, 0x0, r3, 0x0, 0x100000000000a, 0x0) [ 256.583498][T11203] sctp: [Deprecated]: syz-executor.4 (pid 11203) Use of int in max_burst socket option. [ 256.583498][T11203] Use struct sctp_assoc_value instead 01:31:33 executing program 0: accept4$tipc(0xffffffffffffff9c, 0x0, &(0x7f0000000240), 0x80800) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000251c88e8cd9056dd5c7ef700000000000000000000000000001700000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x97) pipe(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000340)={0x20}) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) pwrite64(r0, &(0x7f00000003c0)=' ', 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x10076) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000004c0)=0x8, 0x4) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=0x0, &(0x7f0000000140)=0x4) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={0x0, 0xca}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000440)={0x0, 0x20, 0x2, 0xd14a, 0x4, 0x100, 0x1, 0x80000000, r2}, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f00000002c0)=@generic={0x3, 0x80, 0x9}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x10000}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r2, 0x1}, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x2880008, r0, 0x0, 0xa}) 01:31:33 executing program 5: accept4$tipc(0xffffffffffffff9c, 0x0, &(0x7f0000000240), 0x80800) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000251c88e8cd9056dd5c7ef700000000000000000000000000001700000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x97) pipe(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000340)={0x20}) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) pwrite64(r0, &(0x7f00000003c0)=' ', 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x10076) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000004c0)=0x8, 0x4) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=0x0, &(0x7f0000000140)=0x4) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={0x0, 0xca}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000440)={0x0, 0x20, 0x2, 0xd14a, 0x4, 0x100, 0x1, 0x80000000, r2}, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f00000002c0)=@generic={0x3, 0x80, 0x9}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x10000}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r2, 0x1}, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x2880008, r0, 0x0, 0xa}) 01:31:33 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x7) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000040)=0x2, 0x4) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000008c0), &(0x7f0000000900)=0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback, 0x3}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000500)={0x0, 0xc5, "9b3d19aa246de997060079cc757b62b7c4d06390ef2ca9f3ff553e756ae7a13a36396aaffeb12898816df73171f9676acddce64c739a4140e530fd336f0b0411be7a11beac97d24b5db5197c5ddb54e77d76ff924488a017ebcbd5684253787999b1262413631178dafb552a4588ec86dc042563b5d72348b7de8e89101814ae9194c275cfe540d7cc656e1ef0f68b62b96ccc28b74832cb865bdf97bd5d95608ac43250faaf160efe454b07ffc80463407bf58316d4cc9038706cd6803b7e9419b8a90ce2"}, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000640)={r2, 0x40, 0x1, [0x6]}, &(0x7f0000000680)=0xa) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x6, 0x810, r0, 0x0) r3 = accept(r0, 0x0, &(0x7f0000000740)) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f00000007c0)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x14, r4, 0xf10, 0x70bd29, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={r0}) getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, 0x0, &(0x7f0000000980)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r5, &(0x7f00000004c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10a000}, 0xc, &(0x7f0000000480)={&(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) 01:31:33 executing program 2: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x4, 0x5c832, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) pwritev(r2, &(0x7f0000000100)=[{&(0x7f0000000200)="f7", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f0000000180)) splice(r0, 0x0, r3, 0x0, 0x100000000000a, 0x0) [ 257.138006][T11220] sctp: [Deprecated]: syz-executor.3 (pid 11220) Use of int in max_burst socket option. [ 257.138006][T11220] Use struct sctp_assoc_value instead 01:31:33 executing program 1: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x4, 0x5c832, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) pwritev(r2, &(0x7f0000000100)=[{&(0x7f0000000200)="f7", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f0000000180)) splice(r0, 0x0, r3, 0x0, 0x100000000000a, 0x0) 01:31:33 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x7) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000040)=0x2, 0x4) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000008c0), &(0x7f0000000900)=0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback, 0x3}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000500)={0x0, 0xc5, "9b3d19aa246de997060079cc757b62b7c4d06390ef2ca9f3ff553e756ae7a13a36396aaffeb12898816df73171f9676acddce64c739a4140e530fd336f0b0411be7a11beac97d24b5db5197c5ddb54e77d76ff924488a017ebcbd5684253787999b1262413631178dafb552a4588ec86dc042563b5d72348b7de8e89101814ae9194c275cfe540d7cc656e1ef0f68b62b96ccc28b74832cb865bdf97bd5d95608ac43250faaf160efe454b07ffc80463407bf58316d4cc9038706cd6803b7e9419b8a90ce2"}, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000640)={r2, 0x40, 0x1, [0x6]}, &(0x7f0000000680)=0xa) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x6, 0x810, r0, 0x0) r3 = accept(r0, 0x0, &(0x7f0000000740)) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f00000007c0)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x14, r4, 0xf10, 0x70bd29, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={r0}) getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, 0x0, &(0x7f0000000980)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r5, &(0x7f00000004c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10a000}, 0xc, &(0x7f0000000480)={&(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) [ 257.632324][T11237] sctp: [Deprecated]: syz-executor.4 (pid 11237) Use of int in max_burst socket option. [ 257.632324][T11237] Use struct sctp_assoc_value instead [ 257.670002][ C0] net_ratelimit: 9477 callbacks suppressed [ 257.670019][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 257.676803][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 257.688131][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 257.700079][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 257.711995][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 257.724193][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 257.735936][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 257.747843][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 257.759844][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:f4:29:30:49:21, vlan:0) [ 257.772948][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) 01:31:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x4, &(0x7f0000000280), 0x4) 01:31:34 executing program 3: syz_emit_ethernet(0xd, &(0x7f0000000000)={@local, @empty=[0x6000000088caffff], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x438, 0x0, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0x5}, {[], @icmpv6=@time_exceed={0x3a, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 01:31:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x22) setsockopt$sock_timeval(r1, 0x1, 0x2b, &(0x7f000000b180)={0x77359400}, 0x25e) 01:31:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1ec) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x14}, 0x14}}, 0x8000) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000001c0)={'veth1_to_bridge\x00'}) sendto$inet6(r0, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) 01:31:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x359, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 01:31:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000400)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='veth1\x00', 0xb4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendmmsg(r0, &(0x7f00000019c0)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, 0x0}}, {{0x0, 0x0, &(0x7f0000001980), 0x6e}, 0x40}], 0x2, 0x0) 01:31:35 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000380)={0x9, @null=' \x00'}, 0x12) connect$x25(r0, &(0x7f0000000000)={0x9, @remote}, 0x12) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket(0x7, 0x80000, 0x6) getsockopt$inet6_mreq(r3, 0x29, 0x1f, &(0x7f00000003c0)={@empty}, &(0x7f0000000400)=0x14) ioctl$sock_inet_SIOCGARP(r2, 0x8954, &(0x7f0000000580)={{0x2, 0x4e20, @empty}, {}, 0x4, {0x2, 0x4e22, @empty}}) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000600)={0x7c, r4, 0x10, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xb939}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x101}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x61c}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4}, 0x4000) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1001008}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r5, 0x1, 0x70bd2d, 0x25dfdbfc}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) r6 = epoll_create(0x101) epoll_ctl$EPOLL_CTL_MOD(r6, 0x3, r0, &(0x7f0000000200)={0x50000000}) r7 = accept(r0, &(0x7f0000000280)=@nfc_llcp, &(0x7f0000000240)=0x80) connect$x25(r7, &(0x7f0000000340)={0x9, @null=' \x00'}, 0x12) setsockopt$bt_BT_DEFER_SETUP(r7, 0x112, 0x7, &(0x7f00000001c0)=0x1, 0x4) r8 = socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl(r8, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") 01:31:35 executing program 5: accept4$tipc(0xffffffffffffff9c, 0x0, &(0x7f0000000240), 0x80800) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000251c88e8cd9056dd5c7ef700000000000000000000000000001700000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x97) pipe(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000340)={0x20}) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) pwrite64(r0, &(0x7f00000003c0)=' ', 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x10076) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000004c0)=0x8, 0x4) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=0x0, &(0x7f0000000140)=0x4) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={0x0, 0xca}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000440)={0x0, 0x20, 0x2, 0xd14a, 0x4, 0x100, 0x1, 0x80000000, r2}, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f00000002c0)=@generic={0x3, 0x80, 0x9}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x10000}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r2, 0x1}, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x2880008, r0, 0x0, 0xa}) 01:31:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000400)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='veth1\x00', 0xb4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendmmsg(r0, &(0x7f00000019c0)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, 0x0}}, {{0x0, 0x0, &(0x7f0000001980), 0x6e}, 0x40}], 0x2, 0x0) 01:31:35 executing program 0: accept4$tipc(0xffffffffffffff9c, 0x0, &(0x7f0000000240), 0x80800) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000251c88e8cd9056dd5c7ef700000000000000000000000000001700000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x97) pipe(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000340)={0x20}) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) pwrite64(r0, &(0x7f00000003c0)=' ', 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x10076) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000004c0)=0x8, 0x4) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=0x0, &(0x7f0000000140)=0x4) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={0x0, 0xca}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000440)={0x0, 0x20, 0x2, 0xd14a, 0x4, 0x100, 0x1, 0x80000000, r2}, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f00000002c0)=@generic={0x3, 0x80, 0x9}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x10000}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r2, 0x1}, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x2880008, r0, 0x0, 0xa}) 01:31:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000400)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='veth1\x00', 0xb4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendmmsg(r0, &(0x7f00000019c0)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, 0x0}}, {{0x0, 0x0, &(0x7f0000001980), 0x6e}, 0x40}], 0x2, 0x0) 01:31:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000400)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='veth1\x00', 0xb4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendmmsg(r0, &(0x7f00000019c0)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, 0x0}}, {{0x0, 0x0, &(0x7f0000001980), 0x6e}, 0x40}], 0x2, 0x0) 01:31:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000400)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='veth1\x00', 0xb4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendmmsg(r0, &(0x7f00000019c0)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, 0x0}}, {{0x0, 0x0, &(0x7f0000001980), 0x6e}, 0x40}], 0x2, 0x0) 01:31:35 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000002ec0)={0x42, 0x3, 0x3}, 0x10) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCGETLINKNAME(r2, 0x89e0, &(0x7f0000000180)={0x3, 0x1}) listen(r2, 0x20000000005) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 01:31:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1ec) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x14}, 0x14}}, 0x8000) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000001c0)={'veth1_to_bridge\x00'}) sendto$inet6(r0, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) 01:31:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000400)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='veth1\x00', 0xb4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendmmsg(r0, &(0x7f00000019c0)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, 0x0}}, {{0x0, 0x0, &(0x7f0000001980), 0x6e}, 0x40}], 0x2, 0x0) 01:31:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000400)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='veth1\x00', 0xb4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendmmsg(r0, &(0x7f00000019c0)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, 0x0}}, {{0x0, 0x0, &(0x7f0000001980), 0x6e}, 0x40}], 0x2, 0x0) 01:31:35 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000001d80)={'gre0\x00', 0x0}) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r3}, 0x58) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0200ffff720000000000000000008000000000000000000083cf00000000000040000000000000000000000000000000000000000000520000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x78) 01:31:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='sit0\x00', 0x10) sendto$inet(r0, &(0x7f0000000440)="99", 0x1, 0x0, 0x0, 0x0) [ 259.623540][T11292] syz-executor.1 (11292) used greatest stack depth: 22920 bytes left 01:31:36 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002340)='cpuset.memory_spread_page\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0xfd47) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$PROG_LOAD(0x5, 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x4031, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0xf76925ac}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x4c, &(0x7f0000000000), 0xf}, 0x0) syz_genetlink_get_family_id$team(0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000540)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e21, 0x0, @local}, 0x0, [0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x5c) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x89a2, 0x0) 01:31:36 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x8000000000003, 0x1) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffffff}, 0x4) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 01:31:36 executing program 3: r0 = socket(0x1e, 0x1, 0x0) listen(r0, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000454ff0)={0x0, 0x2710}, 0x10) recvfrom$inet6(r0, &(0x7f0000c6e000)=""/55, 0x37, 0x0, &(0x7f000024a000), 0x1c) 01:31:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1ec) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x14}, 0x14}}, 0x8000) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000001c0)={'veth1_to_bridge\x00'}) sendto$inet6(r0, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) 01:31:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$SIOCNRDECOBS(r1, 0x89e2) 01:31:37 executing program 5: r0 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000140)=@nl, 0x80, &(0x7f0000002000)=[{&(0x7f00000001c0)="5500000018007f8500fe01b2a4a280930a06000000a84308910000003900090035000c00060000001900150000000000000000dc1338d54400009b84136ef75afb83fb448daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1, &(0x7f0000000100)}, 0x0) 01:31:37 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="130000004e0007041dfffd946f610500070000", 0x13}], 0x1}, 0x0) 01:31:37 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040), 0xfb01cbdd028b9044) getsockopt$inet6_opts(r0, 0x29, 0x3b, 0x0, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0x237000)=nil, 0x237000, 0x2, 0x32, 0xffffffffffffffff, 0x0) 01:31:37 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x10000000000002ab) tee(r2, r1, 0x400000000008, 0x0) tee(r0, r3, 0x9, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, &(0x7f00000000c0)) 01:31:37 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="130000004e0007041dfffd946f610500070000", 0x13}], 0x1}, 0x0) 01:31:37 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="130000004e0007041dfffd946f610500070000", 0x13}], 0x1}, 0x0) 01:31:37 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="130000004e0007041dfffd946f610500070000", 0x13}], 0x1}, 0x0) [ 262.679185][ C1] net_ratelimit: 12688 callbacks suppressed [ 262.679200][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 262.679359][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:f4:29:30:49:21, vlan:0) [ 262.685764][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 262.697300][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 262.709754][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 262.721337][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 262.733586][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 262.745121][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 262.757777][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 262.769093][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 267.689040][ C0] net_ratelimit: 23573 callbacks suppressed [ 267.689057][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 267.689376][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 267.697502][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 267.710712][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 267.723120][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 267.734662][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 267.746441][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 267.758688][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 267.770271][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 267.782584][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 272.698952][ C0] net_ratelimit: 24017 callbacks suppressed [ 272.698967][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 272.699105][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 272.705083][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 272.717959][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 272.729439][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 272.741935][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 272.754076][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 272.766494][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 272.778217][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 272.790545][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 277.708958][ C1] net_ratelimit: 23906 callbacks suppressed [ 277.708974][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 277.709646][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 277.715608][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 277.727203][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 277.739516][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 277.751053][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 277.763442][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 277.775039][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 277.787390][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 277.799173][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:f4:29:30:49:21, vlan:0) [ 282.719141][ C0] net_ratelimit: 24332 callbacks suppressed [ 282.719157][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 282.719303][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 282.725309][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 282.738153][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 282.749733][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 282.762006][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 282.773588][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 282.785896][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 282.797529][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:f4:29:30:49:21, vlan:0) [ 282.810044][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 287.729134][ C0] net_ratelimit: 23858 callbacks suppressed [ 287.729150][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 287.729231][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 287.735309][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 287.747960][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 287.759508][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 287.771827][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 287.783377][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 287.795599][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 287.807225][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:f4:29:30:49:21, vlan:0) [ 287.820346][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 292.739081][ C0] net_ratelimit: 23347 callbacks suppressed [ 292.739099][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.739599][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 292.745588][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.757575][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 292.770225][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 292.783664][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 292.795384][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.807640][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.820573][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.833170][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 297.748970][ C0] net_ratelimit: 23159 callbacks suppressed [ 297.748986][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 297.749108][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 297.756726][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 297.771448][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 297.788140][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 297.809860][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 297.823179][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 297.835785][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 297.847491][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 297.861768][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 302.759015][ C0] net_ratelimit: 23847 callbacks suppressed [ 302.759029][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 302.759064][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 302.765159][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 302.777315][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 302.790067][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 302.802846][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 302.814790][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:f4:29:30:49:21, vlan:0) [ 302.827115][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 302.838640][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 302.851416][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 307.768941][ C0] net_ratelimit: 23762 callbacks suppressed [ 307.768954][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 307.779369][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 307.787371][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 307.799775][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 307.813000][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 307.825463][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 307.837308][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 307.849587][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 307.861663][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:f4:29:30:49:21, vlan:0) [ 307.873579][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 312.778985][ C1] net_ratelimit: 23740 callbacks suppressed [ 312.779000][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.779108][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.785474][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.797177][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.809447][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.821322][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.833833][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.845506][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.858528][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.869901][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 317.789341][ C1] net_ratelimit: 23969 callbacks suppressed [ 317.789357][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.789413][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 317.795861][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.809073][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 317.828732][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.832886][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.845121][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.859217][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.869917][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.881455][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:f4:29:30:49:21, vlan:0) 01:32:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x6) writev(r0, &(0x7f0000000000)=[{&(0x7f0000001600)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 01:32:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1ec) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x14}, 0x14}}, 0x8000) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000001c0)={'veth1_to_bridge\x00'}) sendto$inet6(r0, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) 01:32:37 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r0, 0x104, 0x3, &(0x7f0000000000), 0x4) 01:32:37 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x8000000000003, 0x1) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffffff}, 0x4) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 01:32:37 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x8000000000003, 0x1) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffffff}, 0x4) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 01:32:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x2b, 0x1, 0x0) listen(r1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0xdf, 0x0) [ 322.799069][ C1] net_ratelimit: 17044 callbacks suppressed [ 322.799083][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.811020][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:f4:29:30:49:21, vlan:0) [ 322.817746][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.829257][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.841650][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.853211][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.865481][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.876971][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.895250][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.906879][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 01:32:39 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x2, 'lo\x00'}, 0x18) ioctl(r0, 0x800000000008982, &(0x7f0000000000)) 01:32:39 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x4000020200052) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 01:32:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000380)=[{0x2000000ffffff8d, 0x0, 0x0}], 0x1, 0x0) 01:32:39 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x8000000000003, 0x1) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffffff}, 0x4) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 01:32:40 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'tunl0\x00', @ifru_mtu=0x10001}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 01:32:40 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x100000000209e1d, 0x8000000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x740000, 0x0, 0x820000, 0x0, 0x0, [0x4000]}, 0x2c) [ 324.435985][T11425] IPVS: ftp: loaded support on port[0] = 21 [ 324.662681][T11425] chnl_net:caif_netlink_parms(): no params data found [ 324.744580][T11425] bridge0: port 1(bridge_slave_0) entered blocking state [ 324.771952][T11425] bridge0: port 1(bridge_slave_0) entered disabled state [ 324.780699][T11425] device bridge_slave_0 entered promiscuous mode [ 324.816318][T11425] bridge0: port 2(bridge_slave_1) entered blocking state [ 324.824087][T11425] bridge0: port 2(bridge_slave_1) entered disabled state [ 324.845701][T11425] device bridge_slave_1 entered promiscuous mode [ 324.889614][T11425] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 324.900978][T11425] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 324.979736][T11425] team0: Port device team_slave_0 added [ 324.987175][T11425] team0: Port device team_slave_1 added [ 325.127754][T11425] device hsr_slave_0 entered promiscuous mode [ 325.186016][T11425] device hsr_slave_1 entered promiscuous mode [ 325.317604][T11425] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.324811][T11425] bridge0: port 2(bridge_slave_1) entered forwarding state [ 325.332372][T11425] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.339664][T11425] bridge0: port 1(bridge_slave_0) entered forwarding state [ 325.487471][T11425] 8021q: adding VLAN 0 to HW filter on device bond0 [ 325.502181][ T7794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 325.518154][ T7794] bridge0: port 1(bridge_slave_0) entered disabled state [ 325.731315][ T7794] bridge0: port 2(bridge_slave_1) entered disabled state [ 325.766546][ T7794] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 325.826307][T11425] 8021q: adding VLAN 0 to HW filter on device team0 [ 325.844526][ T7794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 325.866764][ T7794] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 325.875432][ T7794] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.882596][ T7794] bridge0: port 1(bridge_slave_0) entered forwarding state [ 325.933125][ T7794] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 325.942138][ T7794] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 325.963530][ T7794] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.970725][ T7794] bridge0: port 2(bridge_slave_1) entered forwarding state [ 325.991468][ T7794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 326.013667][ T7794] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 326.048253][T11425] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 326.079270][T11425] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 326.116674][ T7796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 326.126184][ T7796] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 326.134983][ T7796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 326.150410][ T7796] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 326.172640][ T7796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 326.193785][ T7796] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 326.203387][ T7796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 326.225130][ T7796] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 326.264541][T11425] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 326.273094][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 326.282179][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 01:32:42 executing program 4: getpeername(0xffffffffffffffff, &(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000100)=0x80) connect$unix(r0, &(0x7f00000003c0)=@file={0x0, './file0\x00'}, 0x6e) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000500)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000700)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x24000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x30, r1, 0x4, 0x70bd2a, 0x25dfdbff, {{}, 0x0, 0x4109, 0x0, {0x14, 0x18, {0x1f, @bearer=@l2={'ib', 0x3a, 'irlan0\x00'}}}}, [""]}, 0x30}}, 0x5) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000580)={'veth0_to_bridge\x00', {0x2, 0x4e20, @multicast1}}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000300)={r2}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000600)=ANY=[@ANYBLOB="cb000000c1ef0d63ae45bcfe17be1b8bc4c2576b82ad7fbc81d9d2cb9270450074a1dca75d6543c27bbb7e52ba6476decccd7b2a908caf6cef002ee2d74594a6634a5356a2db4b10a1d6983e90c133d92003225e295752e8d841dd8ee62c75c8d116d74c43c6127f7a1a4342c2d03dc1bc06314baaaaafae2a5075c416f7d3b3e4ec4021089eeb15205fb87d18a361e31daa86500565f8e5a9cf64c4ab75464890a1b20c7f831fd99e700056e00cc687d9eda22d15499e9a0e1ae840a2478e9c41a5"], 0x0) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, 0x0, 0x0) gettid() r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) connect$rds(r4, &(0x7f0000000440)={0x2, 0x0, @multicast1}, 0x10) r5 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) setsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r3, 0x111, 0x1, 0x5, 0x4) write$cgroup_int(r5, &(0x7f00000000c0), 0x4557434d) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000280)={0x0, 0x3, 0x6, 0x1}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000140)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r2, r5, &(0x7f00000002c0), 0x20000000009) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0xffffffffffffffd6) 01:32:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000080)=0x1, 0xb0f6d0573c3ddc1e) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000240)=0x5, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) 01:32:42 executing program 2: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000007000)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 01:32:42 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @ipv4={[], [], @dev}}, 0x1c) sendmmsg(r0, &(0x7f0000000180), 0x38f, 0x0) 01:32:42 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x8000000000003, 0x1) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffffff}, 0x4) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 01:32:42 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x8000000000003, 0x1) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffffff}, 0x4) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 326.582731][T11443] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 01:32:42 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000440), 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f0000000100)={&(0x7f0000000080)={0x4, 0x0, 0x0, {0x0, 0x7530}, {0x77359400}, {}, 0x1, @can={{}, 0xa, 0x0, 0x0, 0x0, "be186bef412a86e5"}}, 0x48}}, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x7ff, 0x1, 0xff, 0x81}, &(0x7f00000001c0)=0x14) r4 = accept4(0xffffffffffffff9c, &(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x0, 0x0) r6 = accept4$nfc_llcp(r4, 0x0, &(0x7f0000000000), 0x80000) connect$nfc_llcp(r6, &(0x7f0000000140)={0x27, 0x0, 0x0, 0x7, 0x0, 0x0, "afc4527a6d47911bc1636e6f17d4daeaa5fbe8464cd4a6c8edd65b2d84f4cc53acb4b61fda56967ede073de2adff193bdc8239d736a289ef72c0ae82b94836"}, 0x60) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='hqgetl\x14\x00\x00\x00\t\x00\x00\x00age_ir?\x00\x00\x00es\x00p\x80#\xbe\xc4\xe5\x05\xab\xcd\x7f\xd3so2\xcb\x85o\xd5\x11\xfe.\xb6\xf9\xf2;\xd0\xbe\xa6\xe9\xb9\xa4Aa\xbe\xfb\x9c\xff\xf1', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r7, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(r7, 0x84, 0x11, &(0x7f0000000400)={r3, 0x1000}, &(0x7f0000000480)=0x8) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000040)) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f00000000c0)={0xed5e0000, 0x0, 0x0, 0x20000fff}) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r7, 0x50, &(0x7f00000001c0)}, 0x10) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080), 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e23, 0x0, @remote, 0x100000000}}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280), 0xfffffe8f) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000200)={0x1736, 0x0, 0x1f10dcf958b43400, 0x3, 0x4, 0x2, 0x1, 0x100000001, r3}, 0x20) 01:32:43 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 01:32:43 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @ipv4={[], [], @dev}}, 0x1c) sendmmsg(r0, &(0x7f0000000180), 0x38f, 0x0) 01:32:43 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 01:32:43 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @ipv4={[], [], @dev}}, 0x1c) sendmmsg(r0, &(0x7f0000000180), 0x38f, 0x0) 01:32:43 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 327.809109][ C0] net_ratelimit: 10933 callbacks suppressed [ 327.809123][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 327.812803][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 327.815709][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 327.827690][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 327.839613][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 327.852329][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 327.864451][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 01:32:44 executing program 4: getpeername(0xffffffffffffffff, &(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000100)=0x80) connect$unix(r0, &(0x7f00000003c0)=@file={0x0, './file0\x00'}, 0x6e) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000500)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000700)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x24000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x30, r1, 0x4, 0x70bd2a, 0x25dfdbff, {{}, 0x0, 0x4109, 0x0, {0x14, 0x18, {0x1f, @bearer=@l2={'ib', 0x3a, 'irlan0\x00'}}}}, [""]}, 0x30}}, 0x5) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000580)={'veth0_to_bridge\x00', {0x2, 0x4e20, @multicast1}}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000300)={r2}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000600)=ANY=[@ANYBLOB="cb000000c1ef0d63ae45bcfe17be1b8bc4c2576b82ad7fbc81d9d2cb9270450074a1dca75d6543c27bbb7e52ba6476decccd7b2a908caf6cef002ee2d74594a6634a5356a2db4b10a1d6983e90c133d92003225e295752e8d841dd8ee62c75c8d116d74c43c6127f7a1a4342c2d03dc1bc06314baaaaafae2a5075c416f7d3b3e4ec4021089eeb15205fb87d18a361e31daa86500565f8e5a9cf64c4ab75464890a1b20c7f831fd99e700056e00cc687d9eda22d15499e9a0e1ae840a2478e9c41a5"], 0x0) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, 0x0, 0x0) gettid() r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) connect$rds(r4, &(0x7f0000000440)={0x2, 0x0, @multicast1}, 0x10) r5 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) setsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r3, 0x111, 0x1, 0x5, 0x4) write$cgroup_int(r5, &(0x7f00000000c0), 0x4557434d) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000280)={0x0, 0x3, 0x6, 0x1}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000140)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r2, r5, &(0x7f00000002c0), 0x20000000009) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0xffffffffffffffd6) [ 327.876119][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 327.889698][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 327.902628][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 01:32:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000001640)=0x3, 0x4) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 01:32:44 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x8000000000003, 0x1) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffffff}, 0x4) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 01:32:44 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @ipv4={[], [], @dev}}, 0x1c) sendmmsg(r0, &(0x7f0000000180), 0x38f, 0x0) 01:32:44 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000440), 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f0000000100)={&(0x7f0000000080)={0x4, 0x0, 0x0, {0x0, 0x7530}, {0x77359400}, {}, 0x1, @can={{}, 0xa, 0x0, 0x0, 0x0, "be186bef412a86e5"}}, 0x48}}, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x7ff, 0x1, 0xff, 0x81}, &(0x7f00000001c0)=0x14) r4 = accept4(0xffffffffffffff9c, &(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x0, 0x0) r6 = accept4$nfc_llcp(r4, 0x0, &(0x7f0000000000), 0x80000) connect$nfc_llcp(r6, &(0x7f0000000140)={0x27, 0x0, 0x0, 0x7, 0x0, 0x0, "afc4527a6d47911bc1636e6f17d4daeaa5fbe8464cd4a6c8edd65b2d84f4cc53acb4b61fda56967ede073de2adff193bdc8239d736a289ef72c0ae82b94836"}, 0x60) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='hqgetl\x14\x00\x00\x00\t\x00\x00\x00age_ir?\x00\x00\x00es\x00p\x80#\xbe\xc4\xe5\x05\xab\xcd\x7f\xd3so2\xcb\x85o\xd5\x11\xfe.\xb6\xf9\xf2;\xd0\xbe\xa6\xe9\xb9\xa4Aa\xbe\xfb\x9c\xff\xf1', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r7, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(r7, 0x84, 0x11, &(0x7f0000000400)={r3, 0x1000}, &(0x7f0000000480)=0x8) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000040)) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f00000000c0)={0xed5e0000, 0x0, 0x0, 0x20000fff}) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r7, 0x50, &(0x7f00000001c0)}, 0x10) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080), 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e23, 0x0, @remote, 0x100000000}}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280), 0xfffffe8f) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000200)={0x1736, 0x0, 0x1f10dcf958b43400, 0x3, 0x4, 0x2, 0x1, 0x100000001, r3}, 0x20) 01:32:44 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 01:32:44 executing program 5: getpeername(0xffffffffffffffff, &(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000100)=0x80) connect$unix(r0, &(0x7f00000003c0)=@file={0x0, './file0\x00'}, 0x6e) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000500)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000700)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x24000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x30, r1, 0x4, 0x70bd2a, 0x25dfdbff, {{}, 0x0, 0x4109, 0x0, {0x14, 0x18, {0x1f, @bearer=@l2={'ib', 0x3a, 'irlan0\x00'}}}}, [""]}, 0x30}}, 0x5) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000580)={'veth0_to_bridge\x00', {0x2, 0x4e20, @multicast1}}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000300)={r2}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000600)=ANY=[@ANYBLOB="cb000000c1ef0d63ae45bcfe17be1b8bc4c2576b82ad7fbc81d9d2cb9270450074a1dca75d6543c27bbb7e52ba6476decccd7b2a908caf6cef002ee2d74594a6634a5356a2db4b10a1d6983e90c133d92003225e295752e8d841dd8ee62c75c8d116d74c43c6127f7a1a4342c2d03dc1bc06314baaaaafae2a5075c416f7d3b3e4ec4021089eeb15205fb87d18a361e31daa86500565f8e5a9cf64c4ab75464890a1b20c7f831fd99e700056e00cc687d9eda22d15499e9a0e1ae840a2478e9c41a5"], 0x0) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, 0x0, 0x0) gettid() r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) connect$rds(r4, &(0x7f0000000440)={0x2, 0x0, @multicast1}, 0x10) r5 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) setsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r3, 0x111, 0x1, 0x5, 0x4) write$cgroup_int(r5, &(0x7f00000000c0), 0x4557434d) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000280)={0x0, 0x3, 0x6, 0x1}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000140)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r2, r5, &(0x7f00000002c0), 0x20000000009) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0xffffffffffffffd6) 01:32:44 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000440), 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f0000000100)={&(0x7f0000000080)={0x4, 0x0, 0x0, {0x0, 0x7530}, {0x77359400}, {}, 0x1, @can={{}, 0xa, 0x0, 0x0, 0x0, "be186bef412a86e5"}}, 0x48}}, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x7ff, 0x1, 0xff, 0x81}, &(0x7f00000001c0)=0x14) r4 = accept4(0xffffffffffffff9c, &(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x0, 0x0) r6 = accept4$nfc_llcp(r4, 0x0, &(0x7f0000000000), 0x80000) connect$nfc_llcp(r6, &(0x7f0000000140)={0x27, 0x0, 0x0, 0x7, 0x0, 0x0, "afc4527a6d47911bc1636e6f17d4daeaa5fbe8464cd4a6c8edd65b2d84f4cc53acb4b61fda56967ede073de2adff193bdc8239d736a289ef72c0ae82b94836"}, 0x60) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='hqgetl\x14\x00\x00\x00\t\x00\x00\x00age_ir?\x00\x00\x00es\x00p\x80#\xbe\xc4\xe5\x05\xab\xcd\x7f\xd3so2\xcb\x85o\xd5\x11\xfe.\xb6\xf9\xf2;\xd0\xbe\xa6\xe9\xb9\xa4Aa\xbe\xfb\x9c\xff\xf1', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r7, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(r7, 0x84, 0x11, &(0x7f0000000400)={r3, 0x1000}, &(0x7f0000000480)=0x8) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000040)) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f00000000c0)={0xed5e0000, 0x0, 0x0, 0x20000fff}) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r7, 0x50, &(0x7f00000001c0)}, 0x10) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080), 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e23, 0x0, @remote, 0x100000000}}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280), 0xfffffe8f) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000200)={0x1736, 0x0, 0x1f10dcf958b43400, 0x3, 0x4, 0x2, 0x1, 0x100000001, r3}, 0x20) 01:32:44 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000440), 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f0000000100)={&(0x7f0000000080)={0x4, 0x0, 0x0, {0x0, 0x7530}, {0x77359400}, {}, 0x1, @can={{}, 0xa, 0x0, 0x0, 0x0, "be186bef412a86e5"}}, 0x48}}, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x7ff, 0x1, 0xff, 0x81}, &(0x7f00000001c0)=0x14) r4 = accept4(0xffffffffffffff9c, &(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x0, 0x0) r6 = accept4$nfc_llcp(r4, 0x0, &(0x7f0000000000), 0x80000) connect$nfc_llcp(r6, &(0x7f0000000140)={0x27, 0x0, 0x0, 0x7, 0x0, 0x0, "afc4527a6d47911bc1636e6f17d4daeaa5fbe8464cd4a6c8edd65b2d84f4cc53acb4b61fda56967ede073de2adff193bdc8239d736a289ef72c0ae82b94836"}, 0x60) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='hqgetl\x14\x00\x00\x00\t\x00\x00\x00age_ir?\x00\x00\x00es\x00p\x80#\xbe\xc4\xe5\x05\xab\xcd\x7f\xd3so2\xcb\x85o\xd5\x11\xfe.\xb6\xf9\xf2;\xd0\xbe\xa6\xe9\xb9\xa4Aa\xbe\xfb\x9c\xff\xf1', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r7, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(r7, 0x84, 0x11, &(0x7f0000000400)={r3, 0x1000}, &(0x7f0000000480)=0x8) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000040)) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f00000000c0)={0xed5e0000, 0x0, 0x0, 0x20000fff}) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r7, 0x50, &(0x7f00000001c0)}, 0x10) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080), 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e23, 0x0, @remote, 0x100000000}}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280), 0xfffffe8f) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000200)={0x1736, 0x0, 0x1f10dcf958b43400, 0x3, 0x4, 0x2, 0x1, 0x100000001, r3}, 0x20) 01:32:45 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000440), 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f0000000100)={&(0x7f0000000080)={0x4, 0x0, 0x0, {0x0, 0x7530}, {0x77359400}, {}, 0x1, @can={{}, 0xa, 0x0, 0x0, 0x0, "be186bef412a86e5"}}, 0x48}}, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x7ff, 0x1, 0xff, 0x81}, &(0x7f00000001c0)=0x14) r4 = accept4(0xffffffffffffff9c, &(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x0, 0x0) r6 = accept4$nfc_llcp(r4, 0x0, &(0x7f0000000000), 0x80000) connect$nfc_llcp(r6, &(0x7f0000000140)={0x27, 0x0, 0x0, 0x7, 0x0, 0x0, "afc4527a6d47911bc1636e6f17d4daeaa5fbe8464cd4a6c8edd65b2d84f4cc53acb4b61fda56967ede073de2adff193bdc8239d736a289ef72c0ae82b94836"}, 0x60) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='hqgetl\x14\x00\x00\x00\t\x00\x00\x00age_ir?\x00\x00\x00es\x00p\x80#\xbe\xc4\xe5\x05\xab\xcd\x7f\xd3so2\xcb\x85o\xd5\x11\xfe.\xb6\xf9\xf2;\xd0\xbe\xa6\xe9\xb9\xa4Aa\xbe\xfb\x9c\xff\xf1', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r7, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(r7, 0x84, 0x11, &(0x7f0000000400)={r3, 0x1000}, &(0x7f0000000480)=0x8) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000040)) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f00000000c0)={0xed5e0000, 0x0, 0x0, 0x20000fff}) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r7, 0x50, &(0x7f00000001c0)}, 0x10) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080), 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e23, 0x0, @remote, 0x100000000}}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280), 0xfffffe8f) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000200)={0x1736, 0x0, 0x1f10dcf958b43400, 0x3, 0x4, 0x2, 0x1, 0x100000001, r3}, 0x20) 01:32:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123d123f3188b070") sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000001d008103e00f80ecdb4cb9d96b63190400000000000000fb120001000e00da1b40d819a9060015000000", 0x2e}], 0x1}, 0x0) 01:32:45 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000440), 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f0000000100)={&(0x7f0000000080)={0x4, 0x0, 0x0, {0x0, 0x7530}, {0x77359400}, {}, 0x1, @can={{}, 0xa, 0x0, 0x0, 0x0, "be186bef412a86e5"}}, 0x48}}, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x7ff, 0x1, 0xff, 0x81}, &(0x7f00000001c0)=0x14) r4 = accept4(0xffffffffffffff9c, &(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x0, 0x0) r6 = accept4$nfc_llcp(r4, 0x0, &(0x7f0000000000), 0x80000) connect$nfc_llcp(r6, &(0x7f0000000140)={0x27, 0x0, 0x0, 0x7, 0x0, 0x0, "afc4527a6d47911bc1636e6f17d4daeaa5fbe8464cd4a6c8edd65b2d84f4cc53acb4b61fda56967ede073de2adff193bdc8239d736a289ef72c0ae82b94836"}, 0x60) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='hqgetl\x14\x00\x00\x00\t\x00\x00\x00age_ir?\x00\x00\x00es\x00p\x80#\xbe\xc4\xe5\x05\xab\xcd\x7f\xd3so2\xcb\x85o\xd5\x11\xfe.\xb6\xf9\xf2;\xd0\xbe\xa6\xe9\xb9\xa4Aa\xbe\xfb\x9c\xff\xf1', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r7, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(r7, 0x84, 0x11, &(0x7f0000000400)={r3, 0x1000}, &(0x7f0000000480)=0x8) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000040)) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f00000000c0)={0xed5e0000, 0x0, 0x0, 0x20000fff}) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r7, 0x50, &(0x7f00000001c0)}, 0x10) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080), 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e23, 0x0, @remote, 0x100000000}}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280), 0xfffffe8f) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000200)={0x1736, 0x0, 0x1f10dcf958b43400, 0x3, 0x4, 0x2, 0x1, 0x100000001, r3}, 0x20) [ 328.979335][T11532] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 01:32:45 executing program 4: getpeername(0xffffffffffffffff, &(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000100)=0x80) connect$unix(r0, &(0x7f00000003c0)=@file={0x0, './file0\x00'}, 0x6e) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000500)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000700)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x24000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x30, r1, 0x4, 0x70bd2a, 0x25dfdbff, {{}, 0x0, 0x4109, 0x0, {0x14, 0x18, {0x1f, @bearer=@l2={'ib', 0x3a, 'irlan0\x00'}}}}, [""]}, 0x30}}, 0x5) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000580)={'veth0_to_bridge\x00', {0x2, 0x4e20, @multicast1}}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000300)={r2}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000600)=ANY=[@ANYBLOB="cb000000c1ef0d63ae45bcfe17be1b8bc4c2576b82ad7fbc81d9d2cb9270450074a1dca75d6543c27bbb7e52ba6476decccd7b2a908caf6cef002ee2d74594a6634a5356a2db4b10a1d6983e90c133d92003225e295752e8d841dd8ee62c75c8d116d74c43c6127f7a1a4342c2d03dc1bc06314baaaaafae2a5075c416f7d3b3e4ec4021089eeb15205fb87d18a361e31daa86500565f8e5a9cf64c4ab75464890a1b20c7f831fd99e700056e00cc687d9eda22d15499e9a0e1ae840a2478e9c41a5"], 0x0) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, 0x0, 0x0) gettid() r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) connect$rds(r4, &(0x7f0000000440)={0x2, 0x0, @multicast1}, 0x10) r5 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) setsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r3, 0x111, 0x1, 0x5, 0x4) write$cgroup_int(r5, &(0x7f00000000c0), 0x4557434d) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000280)={0x0, 0x3, 0x6, 0x1}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000140)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r2, r5, &(0x7f00000002c0), 0x20000000009) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0xffffffffffffffd6) 01:32:45 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000440), 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f0000000100)={&(0x7f0000000080)={0x4, 0x0, 0x0, {0x0, 0x7530}, {0x77359400}, {}, 0x1, @can={{}, 0xa, 0x0, 0x0, 0x0, "be186bef412a86e5"}}, 0x48}}, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x7ff, 0x1, 0xff, 0x81}, &(0x7f00000001c0)=0x14) r4 = accept4(0xffffffffffffff9c, &(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x0, 0x0) r6 = accept4$nfc_llcp(r4, 0x0, &(0x7f0000000000), 0x80000) connect$nfc_llcp(r6, &(0x7f0000000140)={0x27, 0x0, 0x0, 0x7, 0x0, 0x0, "afc4527a6d47911bc1636e6f17d4daeaa5fbe8464cd4a6c8edd65b2d84f4cc53acb4b61fda56967ede073de2adff193bdc8239d736a289ef72c0ae82b94836"}, 0x60) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='hqgetl\x14\x00\x00\x00\t\x00\x00\x00age_ir?\x00\x00\x00es\x00p\x80#\xbe\xc4\xe5\x05\xab\xcd\x7f\xd3so2\xcb\x85o\xd5\x11\xfe.\xb6\xf9\xf2;\xd0\xbe\xa6\xe9\xb9\xa4Aa\xbe\xfb\x9c\xff\xf1', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r7, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(r7, 0x84, 0x11, &(0x7f0000000400)={r3, 0x1000}, &(0x7f0000000480)=0x8) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000040)) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f00000000c0)={0xed5e0000, 0x0, 0x0, 0x20000fff}) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r7, 0x50, &(0x7f00000001c0)}, 0x10) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080), 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e23, 0x0, @remote, 0x100000000}}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280), 0xfffffe8f) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000200)={0x1736, 0x0, 0x1f10dcf958b43400, 0x3, 0x4, 0x2, 0x1, 0x100000001, r3}, 0x20) 01:32:45 executing program 1: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet_mreqsrc(r0, 0x11a, 0x1, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2=0xe000000a, @loopback}, 0x28) 01:32:45 executing program 5: getpeername(0xffffffffffffffff, &(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000100)=0x80) connect$unix(r0, &(0x7f00000003c0)=@file={0x0, './file0\x00'}, 0x6e) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000500)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000700)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x24000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x30, r1, 0x4, 0x70bd2a, 0x25dfdbff, {{}, 0x0, 0x4109, 0x0, {0x14, 0x18, {0x1f, @bearer=@l2={'ib', 0x3a, 'irlan0\x00'}}}}, [""]}, 0x30}}, 0x5) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000580)={'veth0_to_bridge\x00', {0x2, 0x4e20, @multicast1}}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000300)={r2}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000600)=ANY=[@ANYBLOB="cb000000c1ef0d63ae45bcfe17be1b8bc4c2576b82ad7fbc81d9d2cb9270450074a1dca75d6543c27bbb7e52ba6476decccd7b2a908caf6cef002ee2d74594a6634a5356a2db4b10a1d6983e90c133d92003225e295752e8d841dd8ee62c75c8d116d74c43c6127f7a1a4342c2d03dc1bc06314baaaaafae2a5075c416f7d3b3e4ec4021089eeb15205fb87d18a361e31daa86500565f8e5a9cf64c4ab75464890a1b20c7f831fd99e700056e00cc687d9eda22d15499e9a0e1ae840a2478e9c41a5"], 0x0) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, 0x0, 0x0) gettid() r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) connect$rds(r4, &(0x7f0000000440)={0x2, 0x0, @multicast1}, 0x10) r5 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) setsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r3, 0x111, 0x1, 0x5, 0x4) write$cgroup_int(r5, &(0x7f00000000c0), 0x4557434d) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000280)={0x0, 0x3, 0x6, 0x1}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000140)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r2, r5, &(0x7f00000002c0), 0x20000000009) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0xffffffffffffffd6) 01:32:45 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000004c0)={'gretap0\x00', 0x0}) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r2}, 0xc) write$binfmt_elf64(r0, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 01:32:45 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000440), 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f0000000100)={&(0x7f0000000080)={0x4, 0x0, 0x0, {0x0, 0x7530}, {0x77359400}, {}, 0x1, @can={{}, 0xa, 0x0, 0x0, 0x0, "be186bef412a86e5"}}, 0x48}}, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x7ff, 0x1, 0xff, 0x81}, &(0x7f00000001c0)=0x14) r4 = accept4(0xffffffffffffff9c, &(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x0, 0x0) r6 = accept4$nfc_llcp(r4, 0x0, &(0x7f0000000000), 0x80000) connect$nfc_llcp(r6, &(0x7f0000000140)={0x27, 0x0, 0x0, 0x7, 0x0, 0x0, "afc4527a6d47911bc1636e6f17d4daeaa5fbe8464cd4a6c8edd65b2d84f4cc53acb4b61fda56967ede073de2adff193bdc8239d736a289ef72c0ae82b94836"}, 0x60) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='hqgetl\x14\x00\x00\x00\t\x00\x00\x00age_ir?\x00\x00\x00es\x00p\x80#\xbe\xc4\xe5\x05\xab\xcd\x7f\xd3so2\xcb\x85o\xd5\x11\xfe.\xb6\xf9\xf2;\xd0\xbe\xa6\xe9\xb9\xa4Aa\xbe\xfb\x9c\xff\xf1', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r7, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(r7, 0x84, 0x11, &(0x7f0000000400)={r3, 0x1000}, &(0x7f0000000480)=0x8) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000040)) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f00000000c0)={0xed5e0000, 0x0, 0x0, 0x20000fff}) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r7, 0x50, &(0x7f00000001c0)}, 0x10) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080), 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e23, 0x0, @remote, 0x100000000}}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280), 0xfffffe8f) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000200)={0x1736, 0x0, 0x1f10dcf958b43400, 0x3, 0x4, 0x2, 0x1, 0x100000001, r3}, 0x20) 01:32:45 executing program 5: getpeername(0xffffffffffffffff, &(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000100)=0x80) connect$unix(r0, &(0x7f00000003c0)=@file={0x0, './file0\x00'}, 0x6e) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000500)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000700)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x24000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x30, r1, 0x4, 0x70bd2a, 0x25dfdbff, {{}, 0x0, 0x4109, 0x0, {0x14, 0x18, {0x1f, @bearer=@l2={'ib', 0x3a, 'irlan0\x00'}}}}, [""]}, 0x30}}, 0x5) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000580)={'veth0_to_bridge\x00', {0x2, 0x4e20, @multicast1}}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000300)={r2}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000600)=ANY=[@ANYBLOB="cb000000c1ef0d63ae45bcfe17be1b8bc4c2576b82ad7fbc81d9d2cb9270450074a1dca75d6543c27bbb7e52ba6476decccd7b2a908caf6cef002ee2d74594a6634a5356a2db4b10a1d6983e90c133d92003225e295752e8d841dd8ee62c75c8d116d74c43c6127f7a1a4342c2d03dc1bc06314baaaaafae2a5075c416f7d3b3e4ec4021089eeb15205fb87d18a361e31daa86500565f8e5a9cf64c4ab75464890a1b20c7f831fd99e700056e00cc687d9eda22d15499e9a0e1ae840a2478e9c41a5"], 0x0) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, 0x0, 0x0) gettid() r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) connect$rds(r4, &(0x7f0000000440)={0x2, 0x0, @multicast1}, 0x10) r5 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) setsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r3, 0x111, 0x1, 0x5, 0x4) write$cgroup_int(r5, &(0x7f00000000c0), 0x4557434d) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000280)={0x0, 0x3, 0x6, 0x1}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000140)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r2, r5, &(0x7f00000002c0), 0x20000000009) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0xffffffffffffffd6) 01:32:45 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000440), 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f0000000100)={&(0x7f0000000080)={0x4, 0x0, 0x0, {0x0, 0x7530}, {0x77359400}, {}, 0x1, @can={{}, 0xa, 0x0, 0x0, 0x0, "be186bef412a86e5"}}, 0x48}}, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x7ff, 0x1, 0xff, 0x81}, &(0x7f00000001c0)=0x14) r4 = accept4(0xffffffffffffff9c, &(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x0, 0x0) r6 = accept4$nfc_llcp(r4, 0x0, &(0x7f0000000000), 0x80000) connect$nfc_llcp(r6, &(0x7f0000000140)={0x27, 0x0, 0x0, 0x7, 0x0, 0x0, "afc4527a6d47911bc1636e6f17d4daeaa5fbe8464cd4a6c8edd65b2d84f4cc53acb4b61fda56967ede073de2adff193bdc8239d736a289ef72c0ae82b94836"}, 0x60) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='hqgetl\x14\x00\x00\x00\t\x00\x00\x00age_ir?\x00\x00\x00es\x00p\x80#\xbe\xc4\xe5\x05\xab\xcd\x7f\xd3so2\xcb\x85o\xd5\x11\xfe.\xb6\xf9\xf2;\xd0\xbe\xa6\xe9\xb9\xa4Aa\xbe\xfb\x9c\xff\xf1', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r7, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(r7, 0x84, 0x11, &(0x7f0000000400)={r3, 0x1000}, &(0x7f0000000480)=0x8) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000040)) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f00000000c0)={0xed5e0000, 0x0, 0x0, 0x20000fff}) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r7, 0x50, &(0x7f00000001c0)}, 0x10) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080), 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e23, 0x0, @remote, 0x100000000}}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280), 0xfffffe8f) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000200)={0x1736, 0x0, 0x1f10dcf958b43400, 0x3, 0x4, 0x2, 0x1, 0x100000001, r3}, 0x20) 01:32:46 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000440), 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f0000000100)={&(0x7f0000000080)={0x4, 0x0, 0x0, {0x0, 0x7530}, {0x77359400}, {}, 0x1, @can={{}, 0xa, 0x0, 0x0, 0x0, "be186bef412a86e5"}}, 0x48}}, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x7ff, 0x1, 0xff, 0x81}, &(0x7f00000001c0)=0x14) r4 = accept4(0xffffffffffffff9c, &(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x0, 0x0) r6 = accept4$nfc_llcp(r4, 0x0, &(0x7f0000000000), 0x80000) connect$nfc_llcp(r6, &(0x7f0000000140)={0x27, 0x0, 0x0, 0x7, 0x0, 0x0, "afc4527a6d47911bc1636e6f17d4daeaa5fbe8464cd4a6c8edd65b2d84f4cc53acb4b61fda56967ede073de2adff193bdc8239d736a289ef72c0ae82b94836"}, 0x60) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='hqgetl\x14\x00\x00\x00\t\x00\x00\x00age_ir?\x00\x00\x00es\x00p\x80#\xbe\xc4\xe5\x05\xab\xcd\x7f\xd3so2\xcb\x85o\xd5\x11\xfe.\xb6\xf9\xf2;\xd0\xbe\xa6\xe9\xb9\xa4Aa\xbe\xfb\x9c\xff\xf1', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r7, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(r7, 0x84, 0x11, &(0x7f0000000400)={r3, 0x1000}, &(0x7f0000000480)=0x8) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000040)) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f00000000c0)={0xed5e0000, 0x0, 0x0, 0x20000fff}) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r7, 0x50, &(0x7f00000001c0)}, 0x10) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080), 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e23, 0x0, @remote, 0x100000000}}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280), 0xfffffe8f) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000200)={0x1736, 0x0, 0x1f10dcf958b43400, 0x3, 0x4, 0x2, 0x1, 0x100000001, r3}, 0x20) 01:32:46 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000000040), 0x0, &(0x7f0000000280)=[@sndrcv={0x30, 0x84, 0x1, {0x0, 0x0, 0x8201}}], 0x30}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:32:46 executing program 1: r0 = socket(0xa, 0x803, 0x39) unshare(0x400) pwritev(r0, &(0x7f0000000100), 0x0, 0x0) 01:32:46 executing program 4: getpeername(0xffffffffffffffff, &(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000100)=0x80) connect$unix(r0, &(0x7f00000003c0)=@file={0x0, './file0\x00'}, 0x6e) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000500)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000700)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x24000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x30, r1, 0x4, 0x70bd2a, 0x25dfdbff, {{}, 0x0, 0x4109, 0x0, {0x14, 0x18, {0x1f, @bearer=@l2={'ib', 0x3a, 'irlan0\x00'}}}}, [""]}, 0x30}}, 0x5) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000580)={'veth0_to_bridge\x00', {0x2, 0x4e20, @multicast1}}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000300)={r2}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000600)=ANY=[@ANYBLOB="cb000000c1ef0d63ae45bcfe17be1b8bc4c2576b82ad7fbc81d9d2cb9270450074a1dca75d6543c27bbb7e52ba6476decccd7b2a908caf6cef002ee2d74594a6634a5356a2db4b10a1d6983e90c133d92003225e295752e8d841dd8ee62c75c8d116d74c43c6127f7a1a4342c2d03dc1bc06314baaaaafae2a5075c416f7d3b3e4ec4021089eeb15205fb87d18a361e31daa86500565f8e5a9cf64c4ab75464890a1b20c7f831fd99e700056e00cc687d9eda22d15499e9a0e1ae840a2478e9c41a5"], 0x0) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/39, 0x27, 0x0, 0x0, 0x0) gettid() r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) connect$rds(r4, &(0x7f0000000440)={0x2, 0x0, @multicast1}, 0x10) r5 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) setsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r3, 0x111, 0x1, 0x5, 0x4) write$cgroup_int(r5, &(0x7f00000000c0), 0x4557434d) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000280)={0x0, 0x3, 0x6, 0x1}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000140)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) sendfile(r2, r5, &(0x7f00000002c0), 0x20000000009) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[]}}, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0xffffffffffffffd6) 01:32:46 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x2c) socket$rxrpc(0x21, 0x2, 0xa) socket(0x10, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 01:32:46 executing program 5: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x577b32012d5e327f, &(0x7f0000000080)={&(0x7f0000000040)={0xfffffffffffffd68}, 0x103}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="240000001a0025d1", 0x8) sendmmsg$alg(r0, &(0x7f0000000140), 0x17e, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") 01:32:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x60, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) 01:32:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000024000), 0xc, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x20, 0x0, 0x0, 0x0, 0x0, {}, [@nested={0xc, 0x0, [@typed={0x8, 0x0, @binary}]}]}, 0x233}}, 0x0) 01:32:46 executing program 2: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r1 = socket(0x1e, 0x4, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r1, &(0x7f0000000a40), 0x8000000000000b0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 01:32:46 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000d12000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0xc3e) sendmmsg$unix(r1, &(0x7f00000bd000), 0xfffffffffffffdc3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x4001000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") poll(&(0x7f0000000000)=[{r1, 0x100}], 0x1, 0x7fffffff) connect$unix(r0, &(0x7f0000000200)=@abs, 0x6e) [ 330.470739][T11607] rdma_op 000000004bbfca1f conn xmit_rdma (null) [ 330.547014][T11611] rdma_op 00000000421d414e conn xmit_rdma (null) 01:32:46 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x1, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x32) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a, 0x0, 0x0, 0x36}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4, 0x0, 0x3c}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x4000000000004ae, 0x0) 01:32:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000040)={0xffffffffa0018000, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 01:32:47 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f000021d000)={0x2, 0x4e21, @multicast1}, 0x10) syz_emit_ethernet(0x36d, &(0x7f0000000240)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x35f, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000040)={@multicast2, @multicast2, r1}, 0xc) syz_emit_ethernet(0x5c, &(0x7f0000359fd5)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 01:32:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="99a481bdc9e6", @empty=[0x80fe, 0x7, 0x0, 0x300], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x29, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 01:32:47 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f000021d000)={0x2, 0x4e21, @multicast1}, 0x10) syz_emit_ethernet(0x36d, &(0x7f0000000240)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x35f, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000040)={@multicast2, @multicast2, r1}, 0xc) syz_emit_ethernet(0x5c, &(0x7f0000359fd5)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 01:32:47 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x30000, &(0x7f0000000100)={&(0x7f0000000000)={0x347, 0x35, 0x829, 0x0, 0x0, {0x2802, 0x1000000}, [@nested={0x18, 0x0, [@typed={0x3b, 0x1, @ipv6=@loopback={0xfeffffff00000000}}]}]}, 0xfd5a}}, 0x0) 01:32:47 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f000021d000)={0x2, 0x4e21, @multicast1}, 0x10) syz_emit_ethernet(0x36d, &(0x7f0000000240)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x35f, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000040)={@multicast2, @multicast2, r1}, 0xc) syz_emit_ethernet(0x5c, &(0x7f0000359fd5)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) [ 331.320537][T11648] netlink: 755 bytes leftover after parsing attributes in process `syz-executor.0'. 01:32:47 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x30000, &(0x7f0000000100)={&(0x7f0000000000)={0x347, 0x35, 0x829, 0x0, 0x0, {0x2802, 0x1000000}, [@nested={0x18, 0x0, [@typed={0x3b, 0x1, @ipv6=@loopback={0xfeffffff00000000}}]}]}, 0xfd5a}}, 0x0) 01:32:47 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f000021d000)={0x2, 0x4e21, @multicast1}, 0x10) syz_emit_ethernet(0x36d, &(0x7f0000000240)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x35f, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000040)={@multicast2, @multicast2, r1}, 0xc) syz_emit_ethernet(0x5c, &(0x7f0000359fd5)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 01:32:47 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0), 0x4) [ 331.503444][T11656] netlink: 755 bytes leftover after parsing attributes in process `syz-executor.0'. 01:32:47 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @host}, 0x10) listen(r0, 0x0) connect$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x0, @hyper}, 0x10) 01:32:47 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x30000, &(0x7f0000000100)={&(0x7f0000000000)={0x347, 0x35, 0x829, 0x0, 0x0, {0x2802, 0x1000000}, [@nested={0x18, 0x0, [@typed={0x3b, 0x1, @ipv6=@loopback={0xfeffffff00000000}}]}]}, 0xfd5a}}, 0x0) [ 331.777227][T11673] netlink: 755 bytes leftover after parsing attributes in process `syz-executor.0'. 01:32:48 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x1, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x32) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a, 0x0, 0x0, 0x36}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4, 0x0, 0x3c}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x4000000000004ae, 0x0) [ 332.819126][ C1] net_ratelimit: 7326 callbacks suppressed [ 332.819142][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.819412][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 332.825543][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.837674][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 332.850014][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.861668][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.873839][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.886117][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.901988][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.914069][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 01:32:49 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x24, 0x8000, 0x20}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820006, 0x0, 0x2}, 0x2c) 01:32:49 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 01:32:49 executing program 5: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000240)="c109000000002f0000021fe4ac14140de0", 0x11}], 0x1}, 0x0) 01:32:49 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000440), 0x10) sendmsg$can_bcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000200)=ANY=[@ANYBLOB="000000000100000000000400000000003ce93489ca47e9a5cca058e4f2"], 0x1}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000280)={0x5, 0x0, 0x0, {}, {}, {0x0, 0x0, 0x5}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "940e2da48fefad9d"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x6, 0x0, 0x0, {0x77359400}, {0x77359400}, {}, 0x8, @can={{}, 0x0, 0x0, 0x0, 0x0, "c4d981ae211e6951"}}, 0x48}}, 0x0) 01:32:49 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x30000, &(0x7f0000000100)={&(0x7f0000000000)={0x347, 0x35, 0x829, 0x0, 0x0, {0x2802, 0x1000000}, [@nested={0x18, 0x0, [@typed={0x3b, 0x1, @ipv6=@loopback={0xfeffffff00000000}}]}]}, 0xfd5a}}, 0x0) 01:32:49 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x1, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x32) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a, 0x0, 0x0, 0x36}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4, 0x0, 0x3c}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x4000000000004ae, 0x0) [ 333.213338][T11686] netlink: 755 bytes leftover after parsing attributes in process `syz-executor.0'. 01:32:49 executing program 3: r0 = socket(0x1e, 0x2, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0x94) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0xfe3f, &(0x7f0000000000), 0x368, &(0x7f00006e9c68)}, 0x0) 01:32:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00007af000)=[{&(0x7f0000000100)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a23c4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 01:32:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) pread64(r1, &(0x7f00000004c0)=""/191, 0xbf, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) 01:32:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x11}}}}}}}, 0x0) 01:32:49 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) sendto$inet6(r0, &(0x7f0000000040)="df", 0x1, 0x40041, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000000c0), &(0x7f0000000140)=0x8) [ 333.623701][T11712] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 333.692973][T11714] IPVS: ftp: loaded support on port[0] = 21 [ 333.929216][T11694] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.336495][T11712] syz-executor.0 (11712) used greatest stack depth: 21928 bytes left 01:32:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) pread64(r1, &(0x7f00000004c0)=""/191, 0xbf, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) 01:32:50 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x1, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x32) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a, 0x0, 0x0, 0x36}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4, 0x0, 0x3c}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x4000000000004ae, 0x0) [ 334.644643][T11715] IPVS: ftp: loaded support on port[0] = 21 [ 334.736451][T11716] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.821289][ T7794] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 334.852365][ T7794] bridge0: port 1(bridge_slave_0) entered blocking state [ 334.860056][ T7794] bridge0: port 1(bridge_slave_0) entered forwarding state 01:32:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x0) 01:32:53 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f000000e640)={0x0, 0xfcffffff00000000, &(0x7f0000000080)={&(0x7f000000dd40)={0x20, r1, 0x105, 0x0, 0x0, {0x3802}, [{{0x8}, {0x4}}]}, 0x20}}, 0x0) 01:32:53 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={&(0x7f0000000040), 0xc, &(0x7f0000000440)={&(0x7f0000000800)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x80}}}, 0xb8}}, 0x0) 01:32:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) pread64(r1, &(0x7f00000004c0)=""/191, 0xbf, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) 01:32:53 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'wp384\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) write$binfmt_elf32(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='f'], 0x1) 01:32:53 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x20000000021) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f0000000000)="0a5c2d0240316285717070") setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r2, 0x107, 0x9, &(0x7f0000000080)=0x100, 0x4) bind$packet(r2, &(0x7f0000000140)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, &(0x7f0000000000), 0xfedf, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, 0x1a) 01:32:53 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$FS_IOC_GETFSLABEL(r0, 0x800452d2, 0x0) 01:32:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x81000008912, &(0x7f0000000100)="0adc1f123c40a41d88b070") pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r2, &(0x7f0000000340)=ANY=[], 0xff0e) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r3, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r1, 0x0, r2, 0x0, 0x100000000, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0xf0ff7f}}, 0x0) connect$unix(r2, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) 01:32:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020d0000100000000800120000000300000000000000000006000000000000000000000000000000000000000000000000000000000000000000020000009807d7060000000000000000030005000000000002000000ac14ffbb0000000000f20000000000000000000000000000000000000000000000000000000000000000"], 0x80}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="021300000200000010000000e94a0000"], 0x10}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007840)=[{{0x0, 0x0, &(0x7f0000000200)=[{0x0}, {&(0x7f00000002c0)=""/231, 0xe7}], 0x2}}], 0x1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x40000000000014c, 0x0) [ 337.828892][ C0] net_ratelimit: 11342 callbacks suppressed [ 337.828908][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.829526][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.837026][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 337.849746][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.862784][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 337.870283][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.882545][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.888983][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.901362][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.914843][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.838869][ C1] net_ratelimit: 16830 callbacks suppressed [ 342.838884][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.839149][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.845631][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.857808][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.871368][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.883863][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.901075][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.916581][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.935441][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.946732][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.849101][ C1] net_ratelimit: 15296 callbacks suppressed [ 347.849115][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.849225][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.856258][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.868152][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.880864][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.892446][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.905010][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.917269][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.929536][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.941379][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 01:33:04 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) sendto$inet6(r0, &(0x7f0000000040)="df", 0x1, 0x40041, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000000c0), &(0x7f0000000140)=0x8) 01:33:04 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x0, 0x0, 0x0}, 0x48) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r0, 0x800452d3, &(0x7f0000000100)) 01:33:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) pread64(r1, &(0x7f00000004c0)=""/191, 0xbf, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) 01:33:04 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x20000000021) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f0000000000)="0a5c2d0240316285717070") setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r2, 0x107, 0x9, &(0x7f0000000080)=0x100, 0x4) bind$packet(r2, &(0x7f0000000140)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, &(0x7f0000000000), 0xfedf, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, 0x1a) 01:33:04 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x11f, &(0x7f0000000440)={&(0x7f0000000100)={0x30, 0x32, 0x119, 0x0, 0x0, {0x2}, [@nested={0x1c, 0x0, [@typed={0x18, 0x9, @str='vboxnet0\\J,vboxnet1\x00'}]}]}, 0x30}}, 0x0) 01:33:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000020607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e28000000110affffba010000000009b356da5b80d12ce34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) [ 348.101800][T11793] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 348.104418][T11715] syz-executor.3 (11715) used greatest stack depth: 21640 bytes left [ 348.134699][T11793] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 01:33:04 executing program 5: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000070607031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 01:33:04 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x0, 0x0, 0x0}, 0x48) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r0, 0x800452d3, &(0x7f0000000100)) [ 348.233695][T11803] IPVS: ftp: loaded support on port[0] = 21 01:33:04 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x0, 0x0, 0x0}, 0x48) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r0, 0x800452d3, &(0x7f0000000100)) 01:33:04 executing program 1: r0 = socket(0xa, 0x80005, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000000)={'team0\x00', 0x892}) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xfd\x05 \x02\x00', 0xb5}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) [ 348.275411][T11810] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 01:33:04 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x0, 0x0, 0x0}, 0x48) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r0, 0x800452d3, &(0x7f0000000100)) 01:33:04 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r0, 0x0, &(0x7f0000000080)=""/1}, 0x16) 01:33:05 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) sendto$inet6(r0, &(0x7f0000000040)="df", 0x1, 0x40041, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000000c0), &(0x7f0000000140)=0x8) 01:33:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x0, 0x0, 0x0}, 0x48) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r0, 0x800452d3, &(0x7f0000000100)) 01:33:05 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x0, 0x0, 0x0}, 0x48) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r0, 0x800452d3, &(0x7f0000000100)) [ 349.904759][T11841] IPVS: ftp: loaded support on port[0] = 21 01:33:08 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x20000000021) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f0000000000)="0a5c2d0240316285717070") setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r2, 0x107, 0x9, &(0x7f0000000080)=0x100, 0x4) bind$packet(r2, &(0x7f0000000140)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, &(0x7f0000000000), 0xfedf, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, 0x1a) 01:33:08 executing program 1: r0 = socket(0xa, 0x80005, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000000)={'team0\x00', 0x892}) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xfd\x05 \x02\x00', 0xb5}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) 01:33:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000a00)={0x2, &(0x7f0000000040)=[{0x80}, {0x6}]}, 0x10) 01:33:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x0, 0x0, 0x0}, 0x48) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r0, 0x800452d3, &(0x7f0000000100)) 01:33:08 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={0xffffffffffffff9c}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x7}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, &(0x7f0000000180)) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0x38e63ba4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000001c0), &(0x7f0000000200)=0x8) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendfile(r1, r2, 0x0, 0x7fffffff) ioctl$int_in(r0, 0x5452, &(0x7f00000002c0)=0x69) getuid() getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) 01:33:08 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) sendto$inet6(r0, &(0x7f0000000040)="df", 0x1, 0x40041, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000000c0), &(0x7f0000000140)=0x8) [ 352.058706][T11851] IPVS: ftp: loaded support on port[0] = 21 01:33:08 executing program 4: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x4, 0x5c832, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(r0, 0x0, r2, 0x0, 0x100000000000a, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet_smc(0x2b, 0x1, 0x0) ioctl(r3, 0x20000000008912, &(0x7f0000000000)="0a5c2d0240316285717070") socket$alg(0x26, 0x5, 0x0) 01:33:08 executing program 1: r0 = socket(0xa, 0x80005, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000000)={'team0\x00', 0x892}) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xfd\x05 \x02\x00', 0xb5}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) 01:33:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x26, &(0x7f0000000000), 0x20395dd4) 01:33:08 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x20000000021) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f0000000000)="0a5c2d0240316285717070") setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r2, 0x107, 0x9, &(0x7f0000000080)=0x100, 0x4) bind$packet(r2, &(0x7f0000000140)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, &(0x7f0000000000), 0xfedf, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, 0x1a) 01:33:08 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x33, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0xdbd, 0x9, 0xf74a, 0xfffffff800000000}}, &(0x7f00000002c0)=0xb0) ioctl$FICLONE(r3, 0x40049409, r3) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000001980)={0x8001, 0x100000001, 0x0, 0x803}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000280)={'bcsf0\x00', {0x2, 0x4e22, @multicast1}}) r4 = socket$rds(0x15, 0x5, 0x0) bind$alg(r3, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) getpeername(r3, &(0x7f00000001c0)=@nfc_llcp, &(0x7f0000000080)=0x80) r5 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r5, 0x10c, 0x3, &(0x7f0000000000), 0x4) connect$llc(r5, &(0x7f0000000040)={0x1a, 0x337, 0x4b, 0x4, 0x3, 0x7f, @local}, 0x10) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r2, &(0x7f0000000080), 0xffffff19) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000500)={{&(0x7f0000000240)}, &(0x7f00000004c0), 0x4}, 0x20) ioctl$sock_x25_SIOCDELRT(r2, 0x890c, &(0x7f00000003c0)={@null=' \x00', 0xa, 'bcsf0\x00'}) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000000)={0x1a0ffffffff, 0xfff}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000100), 0x10) ioctl(r6, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000040)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) [ 352.825592][T11889] llc_conn_state_process: llc_conn_service failed [ 352.859366][ C1] net_ratelimit: 11464 callbacks suppressed [ 352.859381][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.859492][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.866230][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.878521][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.897150][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.909289][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.921333][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.932834][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.947163][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.959501][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 01:33:09 executing program 1: r0 = socket(0xa, 0x80005, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000000)={'team0\x00', 0x892}) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xfd\x05 \x02\x00', 0xb5}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) 01:33:09 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x33, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0xdbd, 0x9, 0xf74a, 0xfffffff800000000}}, &(0x7f00000002c0)=0xb0) ioctl$FICLONE(r3, 0x40049409, r3) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000001980)={0x8001, 0x100000001, 0x0, 0x803}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000280)={'bcsf0\x00', {0x2, 0x4e22, @multicast1}}) r4 = socket$rds(0x15, 0x5, 0x0) bind$alg(r3, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) getpeername(r3, &(0x7f00000001c0)=@nfc_llcp, &(0x7f0000000080)=0x80) r5 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r5, 0x10c, 0x3, &(0x7f0000000000), 0x4) connect$llc(r5, &(0x7f0000000040)={0x1a, 0x337, 0x4b, 0x4, 0x3, 0x7f, @local}, 0x10) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r2, &(0x7f0000000080), 0xffffff19) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000500)={{&(0x7f0000000240)}, &(0x7f00000004c0), 0x4}, 0x20) ioctl$sock_x25_SIOCDELRT(r2, 0x890c, &(0x7f00000003c0)={@null=' \x00', 0xa, 'bcsf0\x00'}) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000000)={0x1a0ffffffff, 0xfff}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000100), 0x10) ioctl(r6, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000040)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 01:33:09 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={0xffffffffffffff9c}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x7}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, &(0x7f0000000180)) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0x38e63ba4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000001c0), &(0x7f0000000200)=0x8) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendfile(r1, r2, 0x0, 0x7fffffff) ioctl$int_in(r0, 0x5452, &(0x7f00000002c0)=0x69) getuid() getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) 01:33:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) unshare(0x4000400) ioctl$SIOCRSGCAUSE(r1, 0x89ec, &(0x7f0000000040)) [ 353.390521][T11904] llc_conn_state_process: llc_conn_service failed 01:33:09 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r2, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a", 0x8c) sendfile(r0, r0, &(0x7f0000000240), 0x8000) 01:33:09 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000280)={0x1000000efffffff, 0xe00000000000000, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="020d000510000000000000d30000000003000600252000000200046ac00200010000000001000000080012000200030000000000fa0000003000000002030000050000c6a8000000020000000008000092ab000000000001020014bb00200000ffffffde0000000003000500002000000200ebf2df0000210008000002000000"], 0x80}}, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x4, 0x0, 0x88) 01:33:10 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x33, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0xdbd, 0x9, 0xf74a, 0xfffffff800000000}}, &(0x7f00000002c0)=0xb0) ioctl$FICLONE(r3, 0x40049409, r3) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000001980)={0x8001, 0x100000001, 0x0, 0x803}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000280)={'bcsf0\x00', {0x2, 0x4e22, @multicast1}}) r4 = socket$rds(0x15, 0x5, 0x0) bind$alg(r3, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) getpeername(r3, &(0x7f00000001c0)=@nfc_llcp, &(0x7f0000000080)=0x80) r5 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r5, 0x10c, 0x3, &(0x7f0000000000), 0x4) connect$llc(r5, &(0x7f0000000040)={0x1a, 0x337, 0x4b, 0x4, 0x3, 0x7f, @local}, 0x10) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r2, &(0x7f0000000080), 0xffffff19) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000500)={{&(0x7f0000000240)}, &(0x7f00000004c0), 0x4}, 0x20) ioctl$sock_x25_SIOCDELRT(r2, 0x890c, &(0x7f00000003c0)={@null=' \x00', 0xa, 'bcsf0\x00'}) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000000)={0x1a0ffffffff, 0xfff}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000100), 0x10) ioctl(r6, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000040)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 01:33:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$bt_hci(r0, 0x0, 0x2, 0x0, &(0x7f0000000000)) 01:33:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000075c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) [ 353.993513][T11930] llc_conn_state_process: llc_conn_service failed 01:33:10 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x33, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0xdbd, 0x9, 0xf74a, 0xfffffff800000000}}, &(0x7f00000002c0)=0xb0) ioctl$FICLONE(r3, 0x40049409, r3) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000001980)={0x8001, 0x100000001, 0x0, 0x803}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000280)={'bcsf0\x00', {0x2, 0x4e22, @multicast1}}) r4 = socket$rds(0x15, 0x5, 0x0) bind$alg(r3, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) getpeername(r3, &(0x7f00000001c0)=@nfc_llcp, &(0x7f0000000080)=0x80) r5 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r5, 0x10c, 0x3, &(0x7f0000000000), 0x4) connect$llc(r5, &(0x7f0000000040)={0x1a, 0x337, 0x4b, 0x4, 0x3, 0x7f, @local}, 0x10) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r2, &(0x7f0000000080), 0xffffff19) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000500)={{&(0x7f0000000240)}, &(0x7f00000004c0), 0x4}, 0x20) ioctl$sock_x25_SIOCDELRT(r2, 0x890c, &(0x7f00000003c0)={@null=' \x00', 0xa, 'bcsf0\x00'}) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000000)={0x1a0ffffffff, 0xfff}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000100), 0x10) ioctl(r6, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000040)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) [ 354.415627][T11940] llc_conn_state_process: llc_conn_service failed 01:33:12 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={0xffffffffffffff9c}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x7}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, &(0x7f0000000180)) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0x38e63ba4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000001c0), &(0x7f0000000200)=0x8) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendfile(r1, r2, 0x0, 0x7fffffff) ioctl$int_in(r0, 0x5452, &(0x7f00000002c0)=0x69) getuid() getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) 01:33:12 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r2, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a", 0x8c) sendfile(r0, r0, &(0x7f0000000240), 0x8000) 01:33:12 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r2, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a", 0x8c) sendfile(r0, r0, &(0x7f0000000240), 0x8000) 01:33:12 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r2, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a", 0x8c) sendfile(r0, r0, &(0x7f0000000240), 0x8000) 01:33:12 executing program 3: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, &(0x7f0000000000), &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x8100, 'yam0\x00', 'bcsf0\x00', 'ipddp0\x00', 'sit0\x00', @link_local, [], @remote, [], 0xe0, 0x168, 0x1a0, [@time={'time\x00', 0x18}, @vlan={'vlan\x00', 0x8, {{0x7fffffe, 0x0, 0x0, 0x1}}}]}, [@common=@mark={'mark\x00', 0x10}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@mark={'mark\x00', 0x10}}]}]}, 0x2a8) 01:33:13 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) r0 = socket$inet6(0xa, 0x3, 0x20000000021) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 01:33:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @rose, @rose, @rose, @null]}, 0x48) sendto$netrom(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={{0x6, @rose}, [@rose, @netrom, @default, @remote, @bcast, @remote, @netrom, @null]}, 0x48) 01:33:13 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r2, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a", 0x8c) sendfile(r0, r0, &(0x7f0000000240), 0x8000) 01:33:13 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r2, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a", 0x8c) sendfile(r0, r0, &(0x7f0000000240), 0x8000) 01:33:13 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r2, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a", 0x8c) sendfile(r0, r0, &(0x7f0000000240), 0x8000) 01:33:13 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) r0 = socket$inet6(0xa, 0x3, 0x20000000021) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 01:33:13 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000300)={'TPROXY\x00'}, &(0x7f0000000340)=0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) epoll_pwait(r2, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}], 0x6, 0x7, 0x0, 0x0) mmap$xdp(&(0x7f0000ffc000/0x1000)=nil, 0x1070, 0xc, 0x10, r1, 0x0) bind$isdn_base(r2, &(0x7f0000000100)={0x22, 0x3f, 0x6, 0x8}, 0x6) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x60e, 0x68) accept4$ax25(r1, &(0x7f0000000140)={{0x3, @null}, [@bcast, @null, @netrom, @netrom, @null, @default]}, &(0x7f0000000200)=0x48, 0x800) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r3, 0x800442d2, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, @local}]}) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x31b) close(r2) 01:33:13 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={0xffffffffffffff9c}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x1, 0x7}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, &(0x7f0000000180)) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0x38e63ba4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000001c0), &(0x7f0000000200)=0x8) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendfile(r1, r2, 0x0, 0x7fffffff) ioctl$int_in(r0, 0x5452, &(0x7f00000002c0)=0x69) getuid() getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) 01:33:13 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) r0 = socket$inet6(0xa, 0x3, 0x20000000021) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 01:33:13 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r2, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a", 0x8c) sendfile(r0, r0, &(0x7f0000000240), 0x8000) 01:33:13 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r2, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a", 0x8c) sendfile(r0, r0, &(0x7f0000000240), 0x8000) 01:33:13 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r2, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a", 0x8c) sendfile(r0, r0, &(0x7f0000000240), 0x8000) 01:33:14 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffde9, 0x200007fd, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r0, &(0x7f0000001380)="c690b247e0a79dee4d8bd6a93e18e20351255fc9206af90c48df8a21979b8fff74567a0ee995d220108448290c33e05e18f07dfd25e40c35e8b8529401c99a97995366ffd694477dd55743535b1501fa8e6a8e7f9d65b675c4c66346793645a7509ab2355fce3620c34a0648bc4c5378cb4e65b655280593e369a70cc6addb51ed8c5d7cdfb2c3e7c2ce94751104860ce5694bad52bf84c2bcd82772d0555e87ba8b4ea9b0695c5aec8b3100ccfc1322bce582bdc8eb41e423505e0d33148d9bbe47c94ee2f7bb59ed1b652463344b97770b86ff79c7de17de3b33877ad1ab57f725845665f887c57a7434450dde067723e864be8343e01a0c27f9f88c3242d7445f4ac765bb0e364475b88c99ca54330177bf6cb6365364b702ec6b9f615b7ebe86ef98406890cce718a53e0d1430436aa15a1e70106b9d58199e128aa294388c7e38f49c2cef1e98d63071d5c5b3689f132f152eb6005f0071e69ad4b1ffa607419e456cd152cb534f0160346a51fbcde6e2384b2b9553aac23c949d2d1dcbd00a2451e54e26bdd52269f0988d8763bc84d58792a1cfe3abf87b3970a847a529dbb98e960170282f4068fae17f4e0f6c1e4c7229a7758da7c4fb4b3937b602e2a997c153cab1e1da059c652a4675c927fb71ac7ae36f89a7db3adda80a6cadd9f1b30919f10e98f02f46bd9da0f077c9a96dea339b017822d68a171864deaaa83a103aa3ac7375f1f6b37b108784e3e63768e389b89983c292c888062e4d7b6c3f6acda803218b8958fbc61b3644d14d8c9008b867d1a3a695abdabc8015df077d261e8a24b9964b5e0fa8b5a379b1d0c46122fbc58fce674036f962f19d79f8525b0fbccba54eead61b25b2b7b550cc660bbeaf66de9aaadd7098fbc46ac65147f5cbcd1e4ba5d7f3ec48c87e8c36bb4e084a36f2840e7527b66bba322421b62283ab1bd91fa43aee4bd74e72a2d610b85b57f34c7635ef9287e23026269fa91e53ab4160c839d7ae0db8978caf82504760ecea595e954b82116212069763568477505f3ecb31573b504be22e175216249e05c99db3cb7017a11613fc28aa0217531e5490f5ee0453d656142b869b902bf7d925e49196c65004e6909e22432ab0854ada4511869f27b72bbd52c5c587f33ee394871a00c6bce07598c68e3bf6d1e2f6013f2c4b17dbdab9b9c3f739c86c3baa616b3ec5be44569bdaf87bbe111b8cc7de0afcd3431fccd0c3b6249ef1b8be11460f305c50d742bb870e3574d7bcff4b274032c5b24f1c7ead2b08d567ab6665db39bba3bf750577ea5cb618b4f442a47725101ce5a6988b316d9ac435e538b2621c391f16218820894d19aa18aefdc8294617ca84f0f2bc4c8221f4868b579fd6d6b372fc1342aae5b557808d7599453b101633b7b573a9f09a6954e82b0b09f22e217729d374c1f32ad4412ed0b3340739c6e20bd8118395610b94c94e8a7dc6ca1d9db3009f108dcb2e694527ec4ba4d6c66b9b62b52e2c06674a3e9c5dff2e4aceb862d9055f362aff9eb63bfc58d4a21f0a2f0c7a7d16893e57e564bb169202b84f21a1f2f31d986d9f73d9a6df57d5e030bb71c067225fdb62f57afe157f778ebf660ba8d3fe113291de5b856614679bbab54b9d5df1cbdf820068c4b7b2f8e3d85b5e2ad9fec30b0f528ecaf08a94d00601ce1ebb1b640e87dd16163e6a07f3775d1ca0fa7ccee7921690f5f57d076a24f632473bd73f9ee611236cac2e08e0c2a8f589ed80b648733c7b5725bd217c8b65e85c0b2971eb13ce95c0d037bf1f8c5a6d212ddb14bb20766bd727e311d35c6575aac3339600e4f98928a6817e6eb57493ba42aabc01b4b21df9cbdd8e03f44bc0b8369c3d4d7eb0a514d6a4026b12eeadc4c734c46abeceb5ecbc3efa7b26f4b224e88d4d7c16c35541c6f5886d8f22d1238d793e33406e388210a687f1bda3f8f8061fa433fdcb6bb2cbc4e86ba680bf57510545a205127bc4d95b90fe2de61d376526c4d6b9851d3f1aee2f68617695c136247f06d554e35fc5f7df43fab43517e49cf6fcd37c8e382b5cc85a8e4b5869f9b396231fa369ddf44967db37972aed64b1a16dd84bd4a23b05ae64bafb38edce490db376a2106f93ec60ce9312c4733619888bb01fa2e1325f79c53b016b604667e08a9f07113a37f548dc0533f3f9529a76d8f005af1d39431d30ea7eee9533114d411992f65152ed9848f3a6674f07c5ccb087400abcd0a29100ff078e6b9eebf4bddaf34aeb4fe7ba3523c76156b4619e1952e9dabfdeea5f71a5f968731812618eaae6768948ffbc6a79673354b8ef85d3fd8ff9b549dac324a4bd420885d24d0d7825b7b656a28a54070835ee84576d8fe0a26f7bf32429486006ec7c6d9025628cf4827514bc0d3a976ef113d8bf62d7eb3910faf1c8af2e659ca629357d0a9670ac226d8f013cf915ff0bbf8c588ef81999a27f5d6cd72641433ffeeb75e3334c34d03bb7a3a0681a069996df992990b4de67c8218cd0392af13d9e72fa2498de3eea936bc72f7fc60a1f267bab756768b61d50a53fe9bf3a21d3ee76218208ef81fba49b41ae41271cc52a6d72b033523cffa27f5bcd5bf1e83054d0be0e3fec02972f7af11f1c66e864999510d6078c70b31a230f06479090e88f32c91cbe90bec102a3f0bebbd61ba32ca7af134587330e1d0bc66e72df0d2276fe75f03a861a", 0x781, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r0, &(0x7f0000000f40)="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", 0x235, 0x0, 0x0, 0x0) [ 357.873786][ C0] net_ratelimit: 10315 callbacks suppressed [ 357.873802][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.874435][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 357.880547][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.894781][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.906383][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.917894][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.930409][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.942046][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.954160][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:f4:29:30:49:21, vlan:0) [ 357.966503][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 01:33:14 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) r0 = socket$inet6(0xa, 0x3, 0x20000000021) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 01:33:14 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffde9, 0x200007fd, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r0, &(0x7f0000001380)="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", 0x781, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r0, &(0x7f0000000f40)="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", 0x235, 0x0, 0x0, 0x0) 01:33:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000000207031dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 01:33:14 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffde9, 0x200007fd, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r0, &(0x7f0000001380)="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", 0x781, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r0, &(0x7f0000000f40)="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", 0x235, 0x0, 0x0, 0x0) 01:33:14 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0x0, @in=@dev, 0x0, 0x0, 0x0, 0x3e}}, 0xe8) sendmmsg(r1, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 01:33:14 executing program 5: r0 = socket(0xa, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x8100, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0xd0, 0xd0, 0x100, [@vlan={'vlan\x00', 0x8, {{0x0, 0x0, 0x892f, 0x7}}}, @connlabel={'connlabel\x00', 0x8}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xb, 0x0, 0x0, 'bond0\x00', 'team0\x00', 'bond0\x00', 'veth1_to_bridge\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}}]}]}, 0x2a8) [ 358.331235][T12034] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 358.373041][T12031] cannot load conntrack support for proto=7 01:33:14 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x40000000000004}, 0x1c) sendmmsg(r0, &(0x7f0000000140), 0x400000000000316, 0x7ffffff7) 01:33:14 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x1000089b1, &(0x7f0000000180)={'eql\x00', @ifru_names='eql\x00'}) 01:33:14 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffde9, 0x200007fd, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r0, &(0x7f0000001380)="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", 0x781, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r0, &(0x7f0000000f40)="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", 0x235, 0x0, 0x0, 0x0) 01:33:14 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x6, 0x20, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000340), &(0x7f0000000380)}, 0x14) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000004c0)={r0, &(0x7f00000003c0)='%', &(0x7f0000000340)}, 0x18) 01:33:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)={0x6c, r2, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @dev, 0x1004000000}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @ipv4={[0xf0ffff], [], @local}}}}}]}]}, 0x6c}}, 0x0) 01:33:14 executing program 0: r0 = socket$packet(0x11, 0x1000000003, 0x300) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f00000001c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) [ 358.619296][T12054] Started in network mode 01:33:14 executing program 4: socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) clock_gettime(0x0, &(0x7f0000001180)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000001080)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000180)=""/172, 0xac}], 0x1, &(0x7f00000002c0)=""/248, 0xf8}, 0xfffffffffffffffc}, {{&(0x7f00000003c0)=@hci, 0x80, &(0x7f0000000980)=[{&(0x7f0000000440)=""/166, 0xa6}, {&(0x7f0000000500)}, {&(0x7f0000000540)=""/170, 0xaa}, {&(0x7f00000006c0)=""/177, 0xb1}, {&(0x7f0000000780)=""/91, 0x5b}, {&(0x7f0000000800)=""/156, 0x9c}], 0x6, &(0x7f0000000a00)=""/51, 0x33}, 0x6}, {{0x0, 0x0, &(0x7f0000000b00)=[{0x0}], 0x1}, 0xd92f}], 0x3, 0x0, &(0x7f00000011c0)={r2, r3+10000000}) close(r0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") [ 358.668349][T12054] Own node identity fe8, cluster identity 4711 01:33:15 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x40000000000004}, 0x1c) sendmmsg(r0, &(0x7f0000000140), 0x400000000000316, 0x7ffffff7) 01:33:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) epoll_create(0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000140), 0x1c) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000740)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8, @link_local}, 0x10) listen(r2, 0x0) recvmmsg(r2, &(0x7f0000006c80)=[{{&(0x7f0000004600)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000006b40)=[{&(0x7f0000006a00)=""/189, 0xbd}], 0x1, &(0x7f0000006c00)=""/123, 0x7b}}], 0x1, 0x0, 0x0) [ 358.739605][T12054] Enabling of bearer rejected, failed to enable media [ 358.779698][T12062] Enabling of bearer rejected, failed to enable media 01:33:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000016000)=[{0x34}]}, 0x10) 01:33:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)={0x6c, r2, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @dev, 0x1004000000}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @ipv4={[0xf0ffff], [], @local}}}}}]}]}, 0x6c}}, 0x0) 01:33:15 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r2, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") vmsplice(r1, &(0x7f0000001600)=[{&(0x7f0000000440)="62f56b8de134341d5bcfad84a07869dd", 0x10}], 0x1, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) splice(r0, 0x0, r4, 0x0, 0x20000000000, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) recvfrom$netrom(r4, &(0x7f0000001640)=""/4096, 0x1000, 0x0, 0x0, 0x0) [ 359.038678][T12079] Enabling of bearer rejected, failed to enable media 01:33:15 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x40000000000004}, 0x1c) sendmmsg(r0, &(0x7f0000000140), 0x400000000000316, 0x7ffffff7) 01:33:15 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0xffffffc3}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0x99, &(0x7f0000000180)=""/153}, 0x48) 01:33:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0a0000120800000088b070") close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x40000000003, 0x4, 0x4, 0x7cb, 0x0, 0xffffffffffffff9c}, 0x2c) r1 = bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x0, 0x0, 0x20000000, 0x0}, 0x2c) close(r1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) 01:33:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)={0x6c, r2, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @dev, 0x1004000000}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @ipv4={[0xf0ffff], [], @local}}}}}]}]}, 0x6c}}, 0x0) 01:33:15 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, r2}) [ 359.325152][T12098] Enabling of bearer rejected, failed to enable media [ 362.879021][ C1] net_ratelimit: 12800 callbacks suppressed [ 362.879038][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 362.879204][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.885238][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 362.903610][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.927983][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 362.931597][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.943840][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.957091][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.973338][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.985616][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.889409][ C0] net_ratelimit: 16626 callbacks suppressed [ 367.889425][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.890798][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.895887][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.907985][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.919697][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.931895][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.943364][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.955796][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.967557][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.980208][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 01:33:25 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000000)=0x1, 0x4) r1 = socket(0xa, 0x80005, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") ioctl$SIOCSIFMTU(r1, 0x8922, &(0x7f00000002c0)={'bond0\x00', 0x83}) 01:33:25 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$SIOCAX25OPTRT(r0, 0x890b, &(0x7f0000000040)={@default}) 01:33:25 executing program 4: syz_emit_ethernet(0x21a, &(0x7f000070aef1)={@local, @empty=[0x3, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @broadcast}, @udp={0x0, 0x4e20, 0x8}}}}}, 0x0) 01:33:25 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x40000000000004}, 0x1c) sendmmsg(r0, &(0x7f0000000140), 0x400000000000316, 0x7ffffff7) 01:33:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)={0x6c, r2, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @dev, 0x1004000000}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @ipv4={[0xf0ffff], [], @local}}}}}]}]}, 0x6c}}, 0x0) 01:33:25 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x67) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f00000000c0)=0x32, 0x4) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='batadv0\x00', 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x364a348fc67b84c, 0x0) [ 368.932579][T12125] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 01:33:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0x0) 01:33:25 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="5500000018007fafb72d1cb2a4a280930206000000a843096c262369040008000400ac0816000b000000a3", 0x2b}], 0x1}, 0x0) r0 = socket(0x10, 0x80003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x12b, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") [ 369.072537][T12127] Enabling of bearer rejected, failed to enable media 01:33:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c12a41d88b070") r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_aout(r1, &(0x7f0000000b00)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x20404}}, 0x20) [ 369.169829][T12136] netlink: 'syz-executor.3': attribute type 11 has an invalid length. 01:33:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(serpent-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x8) 01:33:25 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast2, 0x0, 0x3c}, 0x0, @in=@empty, 0x0, 0x4, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x4b, 0x0) 01:33:25 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02050609100000000000004c9e00000002000b7b02000090c4625722428e370105000600200000df0a00000800000000000000e50000070000001f0000000000000300000000000002000100f5000000fe0000020000000005000500000000000a000000000000000e0000190900000000170000000000000000000000008000"], 0x80}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x81000008912, &(0x7f0000000100)="0adc1f123c40a41d88b070") sendmmsg(r0, &(0x7f0000000180), 0x400000000000002, 0x0) 01:33:25 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x8, &(0x7f00000006c0)=0x2, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 01:33:25 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x400000000000004, r1}, 0x14) syz_emit_ethernet(0x16, &(0x7f0000000080)={@empty, @dev, [], {@llc={0x806, {@snap={0x0, 0x0, '=', "ba6eb7"}}}}}, 0x0) 01:33:25 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x67) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f00000000c0)=0x32, 0x4) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='batadv0\x00', 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x364a348fc67b84c, 0x0) 01:33:25 executing program 3: syz_emit_ethernet(0x6a, &(0x7f0000000140)={@broadcast, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x6, 0x0, 0x0, 0x0, 0x0, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689, 0x0, @local, @dev, {[@timestamp={0x44, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, 0x0) 01:33:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) r1 = socket$inet6(0xa, 0x3, 0x400000000006) ioctl(r1, 0x8912, 0x0) unshare(0x40000000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, 0x0) r3 = socket$inet(0x2, 0x0, 0x48) socket(0x0, 0x80f, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.events\x00', 0x26e1, 0x0) write$binfmt_elf32(r5, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f00000000c0)={0x20}) write$binfmt_elf32(r5, &(0x7f00000002c0)=ANY=[], 0xfe1c) ioctl$FS_IOC_FIEMAP(r5, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000f700ff7f00000000000001000000000000000000000000000000"]) syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') r6 = accept(r3, &(0x7f0000002840)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000028c0)=0x80) shutdown(0xffffffffffffffff, 0x1) recvmsg(r6, &(0x7f0000000480)={&(0x7f0000000380)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000010c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000440)=""/39, 0x27}, 0x10003) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, 0x0) sendto$llc(r6, &(0x7f0000000100)="f970073b521a3a2059fcfb4e8ff5daaa892b23d0d93e42e29fd18b0a0ba812eee04266ea1e381a4bb2e397868f69542dd70dd9c732d82d1fb2fc114f477c5628dfd9882cb1704a9f32aac44aae8374041822b9186cf14d60459bd23b2cdfa2331560f6603715660f40eb2abb6eb4ac55a1b1b79c6b0cf8b2b9318c3851c8c082044b202dfddf065073e5b86df813839f8469d5e3897560064588b8857deb8aa08bb97eab5a3c887c75722b8f29c0676355437301c7bab02cae987fb632bc787275cc10ffa7d27aec6dde9675ce109785c50042c06113974ffe11fc8c778a", 0xde, 0x800, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={'lo\x00', {0x2, 0x0, @dev}}) socket$key(0xf, 0x3, 0x2) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="0affefff7f000000001e6ea64aa8e1c9", 0x10) accept4(r0, 0x0, 0x0, 0x0) 01:33:26 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0xb}, 0x1c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000f00fb8)={0xe, 0x5, &(0x7f0000b0afd8)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000fe9000)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000e18000)=""/4096}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00004b1000)={0x8, 0x7, &(0x7f0000261000)=@framed={{}, [@map={0x18, 0x9, 0x1, 0x0, r1}, @map={0x18, 0x4, 0x1, 0x0, r0}]}, &(0x7f0000cd0000)='GPL\x00', 0xb4c3, 0x259, &(0x7f0000cdd000)=""/4096}, 0x48) [ 369.885902][T12174] IPVS: ftp: loaded support on port[0] = 21 [ 369.961412][T12177] device lo entered promiscuous mode 01:33:26 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0xb}, 0x1c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000f00fb8)={0xe, 0x5, &(0x7f0000b0afd8)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000fe9000)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000e18000)=""/4096}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00004b1000)={0x8, 0x7, &(0x7f0000261000)=@framed={{}, [@map={0x18, 0x9, 0x1, 0x0, r1}, @map={0x18, 0x4, 0x1, 0x0, r0}]}, &(0x7f0000cd0000)='GPL\x00', 0xb4c3, 0x259, &(0x7f0000cdd000)=""/4096}, 0x48) 01:33:26 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030600100000000000004c9e0000000200130002000000000000000000000105000600200000000a00000000000003000500e50000070000001f000000000000030000000000000200010000000000000000020000000005000500000000000a00000000000001001700000000000000100000000000170000000000000000"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000002, 0x0) 01:33:26 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0xb}, 0x1c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000f00fb8)={0xe, 0x5, &(0x7f0000b0afd8)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000fe9000)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000e18000)=""/4096}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00004b1000)={0x8, 0x7, &(0x7f0000261000)=@framed={{}, [@map={0x18, 0x9, 0x1, 0x0, r1}, @map={0x18, 0x4, 0x1, 0x0, r0}]}, &(0x7f0000cd0000)='GPL\x00', 0xb4c3, 0x259, &(0x7f0000cdd000)=""/4096}, 0x48) 01:33:26 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x67) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f00000000c0)=0x32, 0x4) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='batadv0\x00', 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x364a348fc67b84c, 0x0) 01:33:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x2a6) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2c}]}, 0x1e4) [ 370.643944][T12177] IPVS: ftp: loaded support on port[0] = 21 [ 372.898870][ C0] net_ratelimit: 12800 callbacks suppressed [ 372.898885][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.898907][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.905093][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.919105][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.931261][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 372.943916][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.956461][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 372.971265][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.982531][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.995353][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 01:33:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008b12, &(0x7f0000001180)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 01:33:30 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0xb}, 0x1c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000f00fb8)={0xe, 0x5, &(0x7f0000b0afd8)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000fe9000)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000e18000)=""/4096}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00004b1000)={0x8, 0x7, &(0x7f0000261000)=@framed={{}, [@map={0x18, 0x9, 0x1, 0x0, r1}, @map={0x18, 0x4, 0x1, 0x0, r0}]}, &(0x7f0000cd0000)='GPL\x00', 0xb4c3, 0x259, &(0x7f0000cdd000)=""/4096}, 0x48) 01:33:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x2a6) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2c}]}, 0x1e4) 01:33:30 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x67) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f00000000c0)=0x32, 0x4) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='batadv0\x00', 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x364a348fc67b84c, 0x0) 01:33:30 executing program 4: r0 = socket$packet(0x11, 0x200000000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000000)={'gre0\x00', {0x2, 0x4e22, @loopback}}) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") socket$nl_xfrm(0x11, 0x3, 0x6) accept$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000200)={0x0, 0x0, 0x9b}, &(0x7f0000000440)=0x8) sendto$inet6(r1, &(0x7f0000000300), 0xb1a2, 0x4000000, &(0x7f0000000040)={0xa, 0x4e23, 0x10001, @loopback}, 0x3c07d062d96b8d38) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$packet_buf(r0, 0x107, 0x0, &(0x7f0000000340), 0x0) [ 377.908898][ C0] net_ratelimit: 15814 callbacks suppressed [ 377.908914][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.919273][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.927718][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 377.939809][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.951367][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 377.963641][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.976023][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.989689][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 378.001591][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 378.014793][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.918905][ C0] net_ratelimit: 18292 callbacks suppressed [ 382.918921][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.923441][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.926414][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.939078][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.950663][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.965428][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.978266][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 382.990315][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 383.002930][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 383.014731][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.929153][ C0] net_ratelimit: 19578 callbacks suppressed [ 387.929172][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 387.929281][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.938663][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.954160][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.972737][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.985267][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 388.002199][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 388.017462][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 388.030599][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 388.067661][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 392.939141][ C0] net_ratelimit: 20383 callbacks suppressed [ 392.939157][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 392.939368][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.945803][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 392.958027][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.971144][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:f4:29:30:49:21, vlan:0) [ 392.982544][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.994828][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 393.006957][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 393.018910][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 393.031282][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.949005][ C0] net_ratelimit: 17599 callbacks suppressed [ 397.949022][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.949621][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.955370][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.967916][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.982834][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.995955][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 398.014340][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 398.024283][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 398.036842][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 398.048761][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 402.958966][ C0] net_ratelimit: 21012 callbacks suppressed [ 402.958981][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 402.959306][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 402.965598][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:f4:29:30:49:21, vlan:0) [ 402.979390][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 402.990834][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 403.003675][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 403.015682][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 403.027918][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 403.039398][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 403.051835][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 01:34:03 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) r1 = socket$inet6(0xa, 0x3, 0x400000000006) ioctl(r1, 0x8912, 0x0) unshare(0x40000000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, 0x0) r3 = socket$inet(0x2, 0x0, 0x48) socket(0x0, 0x80f, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.events\x00', 0x26e1, 0x0) write$binfmt_elf32(r5, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f00000000c0)={0x20}) write$binfmt_elf32(r5, &(0x7f00000002c0)=ANY=[], 0xfe1c) ioctl$FS_IOC_FIEMAP(r5, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000f700ff7f00000000000001000000000000000000000000000000"]) syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') r6 = accept(r3, &(0x7f0000002840)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000028c0)=0x80) shutdown(0xffffffffffffffff, 0x1) recvmsg(r6, &(0x7f0000000480)={&(0x7f0000000380)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000010c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000440)=""/39, 0x27}, 0x10003) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, 0x0) sendto$llc(r6, &(0x7f0000000100)="f970073b521a3a2059fcfb4e8ff5daaa892b23d0d93e42e29fd18b0a0ba812eee04266ea1e381a4bb2e397868f69542dd70dd9c732d82d1fb2fc114f477c5628dfd9882cb1704a9f32aac44aae8374041822b9186cf14d60459bd23b2cdfa2331560f6603715660f40eb2abb6eb4ac55a1b1b79c6b0cf8b2b9318c3851c8c082044b202dfddf065073e5b86df813839f8469d5e3897560064588b8857deb8aa08bb97eab5a3c887c75722b8f29c0676355437301c7bab02cae987fb632bc787275cc10ffa7d27aec6dde9675ce109785c50042c06113974ffe11fc8c778a", 0xde, 0x800, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={'lo\x00', {0x2, 0x0, @dev}}) socket$key(0xf, 0x3, 0x2) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="0affefff7f000000001e6ea64aa8e1c9", 0x10) accept4(r0, 0x0, 0x0, 0x0) 01:34:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000100)={{0xa, 0x4e20, 0x5, @local, 0x6}, {0xa, 0x4e23, 0x10000, @empty, 0x5}, 0x6, [0x3, 0x100000001, 0x80000000, 0x8, 0x7, 0x7, 0x800, 0x1]}, 0x5c) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'sit0\x00'}) socket$isdn(0x22, 0x3, 0x0) pipe(0x0) socket$can_raw(0x1d, 0x3, 0x1) syz_genetlink_get_family_id$tipc(&(0x7f0000000600)='TIPC\x00') recvfrom$inet6(r0, &(0x7f0000000180)=""/171, 0xab, 0x140, 0x0, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x24, 0x0, 0x18, 0x70bd28, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x1000}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x4044}, 0x48000) r1 = socket$inet6(0xa, 0x7, 0x1) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x6}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000240)={r2, 0x7, 0x5, [0x7, 0x180000000, 0xfffffffffffffff9, 0x4e1, 0x5]}, &(0x7f0000000280)=0x12) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'sit0\x00\x00\x00\x00\x82\x00\xfc\x00', 0x141}) 01:34:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x2a6) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2c}]}, 0x1e4) 01:34:03 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) writev(r0, 0x0, 0xfffffffffffffdcd) readv(r0, 0x0, 0x0) 01:34:03 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_RECVERR(r0, 0x114, 0x3, &(0x7f0000000380), 0x4) 01:34:03 executing program 4: r0 = socket$packet(0x11, 0x200000000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000000)={'gre0\x00', {0x2, 0x4e22, @loopback}}) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") socket$nl_xfrm(0x11, 0x3, 0x6) accept$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000200)={0x0, 0x0, 0x9b}, &(0x7f0000000440)=0x8) sendto$inet6(r1, &(0x7f0000000300), 0xb1a2, 0x4000000, &(0x7f0000000040)={0xa, 0x4e23, 0x10001, @loopback}, 0x3c07d062d96b8d38) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$packet_buf(r0, 0x107, 0x0, &(0x7f0000000340), 0x0) [ 407.979260][ C1] net_ratelimit: 19141 callbacks suppressed [ 407.979274][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.989174][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.997847][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 408.009688][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 408.022705][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 408.035126][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 408.048128][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 408.060598][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 408.073004][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 408.085681][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 01:34:04 executing program 5: pipe(0x0) r0 = socket(0xa, 0x80005, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000000)={'team0\x00', 0x892}) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000040)={'batadv0\x00', 0x7f}) 01:34:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x2a6) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2c}]}, 0x1e4) [ 408.689485][T12275] device sit0 entered promiscuous mode [ 409.379806][T12256] device sit0 left promiscuous mode 01:34:05 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000440), 0x10) recvmmsg(r0, &(0x7f0000001f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40010000, &(0x7f0000002080)={0x77359400}) sendmsg$can_bcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x5, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "3ce93489ca47e9a5"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x7, 0x0, 0x0, {0x77359400}, {0x77359400}, {}, 0x8, @can={{}, 0x0, 0x0, 0x0, 0x0, "c4d981ae211e6951"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000002180)={0x7, 0x0, 0x0, {0x0, 0x7530}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "3cfbb57069def852"}}, 0x48}}, 0x0) 01:34:05 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='rdma.current\x00', 0x275a, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0xfffffc60) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000240)={0x20}) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) pwrite64(r0, &(0x7f00000003c0)=' ', 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x4e21, 0xc9, @ipv4={[], [], @broadcast}, 0xce3}}, 0x0, 0x1000, 0x0, "f541765194bcb7a0ee15dfd6f5c8fd4e46ce54cf3704b5b65d483326d67231407bd3ce813dd5587fe3a12bd2b589ca98d881f6d8b7bf64c49f2b89911b61f6c2828332a6d1910eec18ffdf003b5f9b23"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) unshare(0x40000000) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000200)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x6) r2 = socket$inet6(0xa, 0x803, 0x3) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000080)={'mangle\x00'}, &(0x7f0000000100)=0x54) syz_genetlink_get_family_id$team(0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x10076) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0xfff, 0x0, 0x4}) 01:34:05 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x2) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x9, 'w'}], 0x18}}], 0x1, 0x0) 01:34:06 executing program 4: r0 = socket$packet(0x11, 0x200000000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000000)={'gre0\x00', {0x2, 0x4e22, @loopback}}) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") socket$nl_xfrm(0x11, 0x3, 0x6) accept$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000200)={0x0, 0x0, 0x9b}, &(0x7f0000000440)=0x8) sendto$inet6(r1, &(0x7f0000000300), 0xb1a2, 0x4000000, &(0x7f0000000040)={0xa, 0x4e23, 0x10001, @loopback}, 0x3c07d062d96b8d38) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$packet_buf(r0, 0x107, 0x0, &(0x7f0000000340), 0x0) 01:34:06 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) r1 = socket$inet6(0xa, 0x3, 0x400000000006) ioctl(r1, 0x8912, 0x0) unshare(0x40000000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, 0x0) r3 = socket$inet(0x2, 0x0, 0x48) socket(0x0, 0x80f, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.events\x00', 0x26e1, 0x0) write$binfmt_elf32(r5, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f00000000c0)={0x20}) write$binfmt_elf32(r5, &(0x7f00000002c0)=ANY=[], 0xfe1c) ioctl$FS_IOC_FIEMAP(r5, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000f700ff7f00000000000001000000000000000000000000000000"]) syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') r6 = accept(r3, &(0x7f0000002840)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000028c0)=0x80) shutdown(0xffffffffffffffff, 0x1) recvmsg(r6, &(0x7f0000000480)={&(0x7f0000000380)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000010c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000440)=""/39, 0x27}, 0x10003) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, 0x0) sendto$llc(r6, &(0x7f0000000100)="f970073b521a3a2059fcfb4e8ff5daaa892b23d0d93e42e29fd18b0a0ba812eee04266ea1e381a4bb2e397868f69542dd70dd9c732d82d1fb2fc114f477c5628dfd9882cb1704a9f32aac44aae8374041822b9186cf14d60459bd23b2cdfa2331560f6603715660f40eb2abb6eb4ac55a1b1b79c6b0cf8b2b9318c3851c8c082044b202dfddf065073e5b86df813839f8469d5e3897560064588b8857deb8aa08bb97eab5a3c887c75722b8f29c0676355437301c7bab02cae987fb632bc787275cc10ffa7d27aec6dde9675ce109785c50042c06113974ffe11fc8c778a", 0xde, 0x800, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={'lo\x00', {0x2, 0x0, @dev}}) socket$key(0xf, 0x3, 0x2) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="0affefff7f000000001e6ea64aa8e1c9", 0x10) accept4(r0, 0x0, 0x0, 0x0) [ 412.988939][ C0] net_ratelimit: 10305 callbacks suppressed [ 412.988954][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.989054][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.995066][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 413.007660][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 413.019497][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 413.032457][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 413.044296][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 413.056393][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 413.068511][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 413.080298][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.999308][ C1] net_ratelimit: 19048 callbacks suppressed [ 417.999322][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 418.009252][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 418.018194][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 418.029629][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 418.042251][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 418.054501][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 418.067352][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 418.079837][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 418.092898][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 418.107584][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 423.008928][ C1] net_ratelimit: 20845 callbacks suppressed [ 423.008942][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 423.009031][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 423.015484][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 423.027521][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 423.039726][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 423.052016][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 423.063968][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 423.076453][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:f4:29:30:49:21, vlan:0) [ 423.088477][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 423.100209][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 428.019013][ C0] net_ratelimit: 20526 callbacks suppressed [ 428.019029][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 428.019287][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 428.025243][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 428.041658][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 428.049453][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 428.061758][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 428.073391][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 428.085807][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 428.097596][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 428.109153][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 433.035156][ C0] net_ratelimit: 20433 callbacks suppressed [ 433.035170][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.041871][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.053895][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 433.065698][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 433.077374][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 433.090715][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.102649][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:f4:29:30:49:21, vlan:0) [ 433.114713][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.126394][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.138693][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 438.039138][ C1] net_ratelimit: 20847 callbacks suppressed [ 438.039153][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.039666][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.045281][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.061245][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.075268][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.081631][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:f4:29:30:49:21, vlan:0) [ 438.093954][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.105452][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.117832][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.129444][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 443.049179][ C1] net_ratelimit: 20094 callbacks suppressed [ 443.049196][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 443.050516][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 443.055725][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 443.068106][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:f4:29:30:49:21, vlan:0) [ 443.079669][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 443.091837][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 443.104088][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 443.116446][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 443.134941][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 443.140398][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 448.059142][ C0] net_ratelimit: 20558 callbacks suppressed [ 448.059158][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 448.063268][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 448.065606][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 448.077797][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 448.089396][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 448.101733][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 448.113313][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 448.125710][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 448.137137][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 448.149580][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 453.069225][ C0] net_ratelimit: 21255 callbacks suppressed [ 453.069242][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 453.069269][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 453.076112][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 453.087826][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 453.100609][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 453.112427][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 453.124521][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:f4:29:30:49:21, vlan:0) [ 453.149876][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 453.155682][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 453.169097][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 458.079027][ C1] net_ratelimit: 20882 callbacks suppressed [ 458.079042][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 458.079081][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 458.085686][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 458.097646][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 458.109995][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 458.121925][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 458.133930][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 458.145843][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 458.157812][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 458.169387][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:f4:29:30:49:21, vlan:0) [ 463.088970][ C0] net_ratelimit: 18832 callbacks suppressed [ 463.088986][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 463.089284][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 463.095708][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 463.107561][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 463.119070][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 463.131534][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 463.142969][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 463.155307][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 463.167114][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 463.184789][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 468.098869][ C0] net_ratelimit: 20045 callbacks suppressed [ 468.098883][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 468.099464][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 468.105133][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 468.117508][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 468.129345][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 468.141338][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 468.153071][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 468.165543][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 468.177332][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:f4:29:30:49:21, vlan:0) [ 468.195459][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 473.116444][ C1] net_ratelimit: 20501 callbacks suppressed [ 473.116461][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 473.126616][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 473.135127][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 473.146697][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 473.159261][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 473.170806][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 473.182909][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 473.194892][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 473.206739][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 473.218786][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 478.119151][ C1] net_ratelimit: 19093 callbacks suppressed [ 478.119167][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 478.138103][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 478.151236][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 478.164201][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 478.177045][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 478.177523][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 478.189586][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 478.201079][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 478.213726][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 478.225054][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 483.128859][ C1] net_ratelimit: 21345 callbacks suppressed [ 483.128875][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 483.128946][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 483.135400][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 483.147078][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 483.159375][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 483.171328][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:f4:29:30:49:21, vlan:0) [ 483.183277][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 483.194757][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 483.212552][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 483.218738][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 488.138939][ C0] net_ratelimit: 20118 callbacks suppressed [ 488.138956][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 488.139142][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 488.145251][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 488.157536][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 488.169433][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 488.181359][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 488.197468][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 488.205178][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 488.217125][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 488.229300][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 493.148856][ C1] net_ratelimit: 20765 callbacks suppressed [ 493.148871][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 493.150737][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 493.157901][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 493.172180][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 493.184638][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 493.196444][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 493.208644][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 493.221955][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:f4:29:30:49:21, vlan:0) [ 493.233884][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 493.245553][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 498.159011][ C0] net_ratelimit: 21076 callbacks suppressed [ 498.159027][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 498.159212][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 498.165672][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 498.180470][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 498.192596][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 498.204926][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 498.218574][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 498.234956][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 498.248539][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:f4:29:30:49:21, vlan:0) [ 498.263763][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 503.169029][ C1] net_ratelimit: 20875 callbacks suppressed [ 503.169043][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 503.170960][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 503.175695][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 503.187310][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 503.199651][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 503.216279][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 503.229077][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 503.241286][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 503.256903][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 503.268496][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 508.179145][ C1] net_ratelimit: 20195 callbacks suppressed [ 508.179160][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 508.179168][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:f4:29:30:49:21, vlan:0) [ 508.179405][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 508.188675][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 508.202760][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 508.214748][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 508.226720][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 508.240046][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 508.259912][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 508.263694][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 508.481066][ T286] device veth0_to_bridge left promiscuous mode [ 508.487437][ T286] bridge0: port 3(veth0_to_bridge) entered disabled state [ 511.312550][ T286] device bridge_slave_1 left promiscuous mode [ 511.325130][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 512.282856][ T286] device bridge_slave_0 left promiscuous mode [ 512.292438][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 513.188963][ C0] net_ratelimit: 18610 callbacks suppressed [ 513.188978][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 513.189028][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 513.195366][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 513.207294][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 513.219288][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 513.232012][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 513.244626][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 513.257054][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 513.268629][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 513.280958][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 518.198955][ C1] net_ratelimit: 15480 callbacks suppressed [ 518.198971][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 518.198999][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 518.205491][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 518.217532][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 518.229503][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 518.241366][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 518.253750][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 518.265230][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 518.276982][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 518.289437][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 523.208973][ C1] net_ratelimit: 18635 callbacks suppressed [ 523.208990][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 523.209187][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 523.215796][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 523.227761][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 523.239522][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 523.251943][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 523.263927][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 523.276116][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 523.287957][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 523.299859][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 525.314760][ T286] device hsr_slave_1 left promiscuous mode [ 526.423946][ T286] device hsr_slave_0 left promiscuous mode [ 528.218948][ C0] net_ratelimit: 18827 callbacks suppressed [ 528.218963][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 528.219013][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 528.225073][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 528.237526][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 528.250455][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 528.262868][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 528.274846][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 528.286608][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 528.298301][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 528.310128][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 529.000559][ T286] team0 (unregistering): Port device team_slave_1 removed [ 529.807172][ T286] team0 (unregistering): Port device team_slave_0 removed [ 530.186764][ T286] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 531.454072][ T286] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 533.229042][ C0] net_ratelimit: 16321 callbacks suppressed [ 533.229058][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 533.229268][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 533.235311][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 533.247845][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 533.259491][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 533.271315][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 533.283701][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 533.295566][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 533.307426][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 533.319263][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 535.315465][ T286] bond0 (unregistering): Released all slaves [ 538.238897][ C0] net_ratelimit: 17036 callbacks suppressed [ 538.238911][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 538.239058][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 538.245209][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 538.257125][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 538.269502][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 538.281130][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 538.293608][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 538.308628][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 538.317462][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 538.329055][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 543.248996][ C1] net_ratelimit: 20505 callbacks suppressed [ 543.249012][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 543.249159][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 543.256344][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 543.267210][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 543.279898][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 543.291522][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 543.303572][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 543.315800][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 543.328010][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 543.340152][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 548.258912][ C0] net_ratelimit: 21012 callbacks suppressed [ 548.258928][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 548.259477][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 548.265094][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 548.277439][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 548.288934][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 548.301702][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 548.313318][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 548.325955][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 548.337305][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 548.349272][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 553.268917][ C0] net_ratelimit: 20724 callbacks suppressed [ 553.268935][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 553.269350][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 553.275070][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 553.287123][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 553.299294][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 553.311517][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 553.323471][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 553.335532][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 553.347409][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 553.359626][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 558.279146][ C0] net_ratelimit: 20757 callbacks suppressed [ 558.279163][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 558.279242][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 558.285687][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 558.297651][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 558.314968][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 558.321518][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 558.333388][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 558.345384][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 558.357394][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 558.369426][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 563.289168][ C1] net_ratelimit: 20070 callbacks suppressed [ 563.289184][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 563.289358][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 563.295699][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 563.307251][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 563.319961][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 563.331324][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 563.343217][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 563.355188][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 563.367493][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 563.379232][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 568.299022][ C0] net_ratelimit: 19220 callbacks suppressed [ 568.299037][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 568.299145][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 568.305588][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 568.317590][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 568.329421][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 568.341427][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 568.353022][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 568.365321][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 568.376931][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 568.389309][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 01:36:46 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x2) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x9, 'w'}], 0x18}}], 0x1, 0x0) 01:36:46 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='rdma.current\x00', 0x275a, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0xfffffc60) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000240)={0x20}) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) pwrite64(r0, &(0x7f00000003c0)=' ', 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x4e21, 0xc9, @ipv4={[], [], @broadcast}, 0xce3}}, 0x0, 0x1000, 0x0, "f541765194bcb7a0ee15dfd6f5c8fd4e46ce54cf3704b5b65d483326d67231407bd3ce813dd5587fe3a12bd2b589ca98d881f6d8b7bf64c49f2b89911b61f6c2828332a6d1910eec18ffdf003b5f9b23"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) unshare(0x40000000) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000200)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x6) r2 = socket$inet6(0xa, 0x803, 0x3) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000080)={'mangle\x00'}, &(0x7f0000000100)=0x54) syz_genetlink_get_family_id$team(0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x10076) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0xfff, 0x0, 0x4}) 01:36:46 executing program 4: r0 = socket$packet(0x11, 0x200000000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000000)={'gre0\x00', {0x2, 0x4e22, @loopback}}) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") socket$nl_xfrm(0x11, 0x3, 0x6) accept$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000200)={0x0, 0x0, 0x9b}, &(0x7f0000000440)=0x8) sendto$inet6(r1, &(0x7f0000000300), 0xb1a2, 0x4000000, &(0x7f0000000040)={0xa, 0x4e23, 0x10001, @loopback}, 0x3c07d062d96b8d38) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$packet_buf(r0, 0x107, 0x0, &(0x7f0000000340), 0x0) 01:36:46 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) r1 = socket$inet6(0xa, 0x3, 0x400000000006) ioctl(r1, 0x8912, 0x0) unshare(0x40000000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, 0x0) r3 = socket$inet(0x2, 0x0, 0x48) socket(0x0, 0x80f, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.events\x00', 0x26e1, 0x0) write$binfmt_elf32(r5, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f00000000c0)={0x20}) write$binfmt_elf32(r5, &(0x7f00000002c0)=ANY=[], 0xfe1c) ioctl$FS_IOC_FIEMAP(r5, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000f700ff7f00000000000001000000000000000000000000000000"]) syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') r6 = accept(r3, &(0x7f0000002840)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000028c0)=0x80) shutdown(0xffffffffffffffff, 0x1) recvmsg(r6, &(0x7f0000000480)={&(0x7f0000000380)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000010c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000440)=""/39, 0x27}, 0x10003) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, 0x0) sendto$llc(r6, &(0x7f0000000100)="f970073b521a3a2059fcfb4e8ff5daaa892b23d0d93e42e29fd18b0a0ba812eee04266ea1e381a4bb2e397868f69542dd70dd9c732d82d1fb2fc114f477c5628dfd9882cb1704a9f32aac44aae8374041822b9186cf14d60459bd23b2cdfa2331560f6603715660f40eb2abb6eb4ac55a1b1b79c6b0cf8b2b9318c3851c8c082044b202dfddf065073e5b86df813839f8469d5e3897560064588b8857deb8aa08bb97eab5a3c887c75722b8f29c0676355437301c7bab02cae987fb632bc787275cc10ffa7d27aec6dde9675ce109785c50042c06113974ffe11fc8c778a", 0xde, 0x800, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={'lo\x00', {0x2, 0x0, @dev}}) socket$key(0xf, 0x3, 0x2) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="0affefff7f000000001e6ea64aa8e1c9", 0x10) accept4(r0, 0x0, 0x0, 0x0) 01:36:46 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x1}, 0xb) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f0000003dc0)=[{{&(0x7f0000000340)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, 0x0}}], 0x1, 0x2000, 0x0) 01:36:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000100)={{0xa, 0x4e20, 0x5, @local, 0x6}, {0xa, 0x4e23, 0x10000, @empty, 0x5}, 0x6, [0x3, 0x100000001, 0x80000000, 0x8, 0x7, 0x7, 0x800, 0x1]}, 0x5c) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'sit0\x00'}) socket$isdn(0x22, 0x3, 0x0) pipe(0x0) socket$can_raw(0x1d, 0x3, 0x1) syz_genetlink_get_family_id$tipc(&(0x7f0000000600)='TIPC\x00') recvfrom$inet6(r0, &(0x7f0000000180)=""/171, 0xab, 0x140, 0x0, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x24, 0x0, 0x18, 0x70bd28, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x1000}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x4044}, 0x48000) r1 = socket$inet6(0xa, 0x7, 0x1) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x6}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000240)={r2, 0x7, 0x5, [0x7, 0x180000000, 0xfffffffffffffff9, 0x4e1, 0x5]}, &(0x7f0000000280)=0x12) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'sit0\x00\x00\x00\x00\x82\x00\xfc\x00', 0x141}) 01:36:48 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x2) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x9, 'w'}], 0x18}}], 0x1, 0x0) [ 572.564445][T12337] IPVS: ftp: loaded support on port[0] = 21 [ 572.575880][T12343] IPVS: ftp: loaded support on port[0] = 21 01:36:48 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x2) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x9, 'w'}], 0x18}}], 0x1, 0x0) 01:36:49 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000100)={{0xa, 0x4e20, 0x5, @local, 0x6}, {0xa, 0x4e23, 0x10000, @empty, 0x5}, 0x6, [0x3, 0x100000001, 0x80000000, 0x8, 0x7, 0x7, 0x800, 0x1]}, 0x5c) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'sit0\x00'}) socket$isdn(0x22, 0x3, 0x0) pipe(0x0) socket$can_raw(0x1d, 0x3, 0x1) syz_genetlink_get_family_id$tipc(&(0x7f0000000600)='TIPC\x00') recvfrom$inet6(r0, &(0x7f0000000180)=""/171, 0xab, 0x140, 0x0, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x24, 0x0, 0x18, 0x70bd28, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x1000}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x4044}, 0x48000) r1 = socket$inet6(0xa, 0x7, 0x1) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x6}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000240)={r2, 0x7, 0x5, [0x7, 0x180000000, 0xfffffffffffffff9, 0x4e1, 0x5]}, &(0x7f0000000280)=0x12) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'sit0\x00\x00\x00\x00\x82\x00\xfc\x00', 0x141}) 01:36:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x4, &(0x7f0000000240)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @local}}}, 0x108) [ 573.308902][ C1] net_ratelimit: 13146 callbacks suppressed [ 573.308918][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 573.327648][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 573.340349][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 573.352934][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 573.365568][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 573.380936][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 573.396328][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 573.411163][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 573.425129][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 573.485274][T12370] device sit0 entered promiscuous mode 01:36:49 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) sendmsg(r0, &(0x7f0000001440)={&(0x7f0000000140)=@in6={0xa, 0x4e21}, 0x5ef, &(0x7f0000001200), 0x322}, 0x8000) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) 01:36:49 executing program 4: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) connect$vsock_dgram(r0, &(0x7f0000000140)={0x28, 0x0, 0x0, @hyper}, 0x10) [ 573.623606][T12371] IPVS: ftp: loaded support on port[0] = 21 [ 573.700795][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 01:36:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='rdma.current\x00', 0x275a, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0xfffffc60) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000240)={0x20}) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) pwrite64(r0, &(0x7f00000003c0)=' ', 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x4e21, 0xc9, @ipv4={[], [], @broadcast}, 0xce3}}, 0x0, 0x1000, 0x0, "f541765194bcb7a0ee15dfd6f5c8fd4e46ce54cf3704b5b65d483326d67231407bd3ce813dd5587fe3a12bd2b589ca98d881f6d8b7bf64c49f2b89911b61f6c2828332a6d1910eec18ffdf003b5f9b23"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) unshare(0x40000000) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000200)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x6) r2 = socket$inet6(0xa, 0x803, 0x3) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000080)={'mangle\x00'}, &(0x7f0000000100)=0x54) syz_genetlink_get_family_id$team(0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x10076) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0xfff, 0x0, 0x4}) 01:36:50 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x7) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000005600)=[@in6={0xa, 0x0, 0x2, @ipv4={[], [], @multicast1}, 0xff2}], 0x1c) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, &(0x7f00000054c0)) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000005500)={0x0, 0xc00000000000000}, 0x8) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000740)='bcsf0\x00') accept(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, 0x0) 01:36:50 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000100)={{0xa, 0x4e20, 0x5, @local, 0x6}, {0xa, 0x4e23, 0x10000, @empty, 0x5}, 0x6, [0x3, 0x100000001, 0x80000000, 0x8, 0x7, 0x7, 0x800, 0x1]}, 0x5c) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'sit0\x00'}) socket$isdn(0x22, 0x3, 0x0) pipe(0x0) socket$can_raw(0x1d, 0x3, 0x1) syz_genetlink_get_family_id$tipc(&(0x7f0000000600)='TIPC\x00') recvfrom$inet6(r0, &(0x7f0000000180)=""/171, 0xab, 0x140, 0x0, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x24, 0x0, 0x18, 0x70bd28, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x1000}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x4044}, 0x48000) r1 = socket$inet6(0xa, 0x7, 0x1) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x6}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000240)={r2, 0x7, 0x5, [0x7, 0x180000000, 0xfffffffffffffff9, 0x4e1, 0x5]}, &(0x7f0000000280)=0x12) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'sit0\x00\x00\x00\x00\x82\x00\xfc\x00', 0x141}) [ 573.803367][T12380] IPVS: ftp: loaded support on port[0] = 21 [ 573.970687][T12388] device sit0 left promiscuous mode [ 574.536934][T12397] device sit0 entered promiscuous mode [ 574.685408][T12371] chnl_net:caif_netlink_parms(): no params data found [ 574.939831][T12371] bridge0: port 1(bridge_slave_0) entered blocking state [ 574.947390][T12371] bridge0: port 1(bridge_slave_0) entered disabled state [ 574.989987][T12371] device bridge_slave_0 entered promiscuous mode [ 575.061375][T12371] bridge0: port 2(bridge_slave_1) entered blocking state [ 575.088955][T12371] bridge0: port 2(bridge_slave_1) entered disabled state [ 575.112123][T12371] device bridge_slave_1 entered promiscuous mode [ 575.260230][T12371] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 575.287872][T12380] chnl_net:caif_netlink_parms(): no params data found [ 575.333564][T12371] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 575.472358][T12371] team0: Port device team_slave_0 added [ 575.503970][T12371] team0: Port device team_slave_1 added [ 575.524460][T12380] bridge0: port 1(bridge_slave_0) entered blocking state [ 575.554187][T12380] bridge0: port 1(bridge_slave_0) entered disabled state [ 575.564473][T12380] device bridge_slave_0 entered promiscuous mode [ 575.613331][T12380] bridge0: port 2(bridge_slave_1) entered blocking state [ 575.621288][T12380] bridge0: port 2(bridge_slave_1) entered disabled state [ 575.665839][T12380] device bridge_slave_1 entered promiscuous mode 01:36:52 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='rdma.current\x00', 0x275a, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0xfffffc60) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000240)={0x20}) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) pwrite64(r0, &(0x7f00000003c0)=' ', 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x4e21, 0xc9, @ipv4={[], [], @broadcast}, 0xce3}}, 0x0, 0x1000, 0x0, "f541765194bcb7a0ee15dfd6f5c8fd4e46ce54cf3704b5b65d483326d67231407bd3ce813dd5587fe3a12bd2b589ca98d881f6d8b7bf64c49f2b89911b61f6c2828332a6d1910eec18ffdf003b5f9b23"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) unshare(0x40000000) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000200)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x6) r2 = socket$inet6(0xa, 0x803, 0x3) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000080)={'mangle\x00'}, &(0x7f0000000100)=0x54) syz_genetlink_get_family_id$team(0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x10076) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0xfff, 0x0, 0x4}) [ 576.602531][T12371] device hsr_slave_0 entered promiscuous mode [ 576.699106][T12371] device hsr_slave_1 entered promiscuous mode [ 576.801749][T12371] bridge0: port 2(bridge_slave_1) entered blocking state [ 576.808941][T12371] bridge0: port 2(bridge_slave_1) entered forwarding state [ 576.816313][T12371] bridge0: port 1(bridge_slave_0) entered blocking state [ 576.823468][T12371] bridge0: port 1(bridge_slave_0) entered forwarding state [ 578.319321][ C1] net_ratelimit: 10095 callbacks suppressed [ 578.319336][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 578.323322][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 578.327022][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 578.339096][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 578.351569][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 578.363171][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 578.375448][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 578.387236][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 578.399158][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 578.410958][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 578.488684][ T7791] bridge0: port 1(bridge_slave_0) entered disabled state [ 578.504822][ T7791] bridge0: port 2(bridge_slave_1) entered disabled state [ 578.607222][T12380] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 578.639800][T12380] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 578.722546][T12380] team0: Port device team_slave_0 added [ 578.768994][T12371] 8021q: adding VLAN 0 to HW filter on device bond0 [ 578.777767][T12380] team0: Port device team_slave_1 added [ 578.975828][ T7796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 578.984001][ T7796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 579.022339][T12371] 8021q: adding VLAN 0 to HW filter on device team0 [ 582.766839][T12380] device hsr_slave_0 entered promiscuous mode [ 583.329163][ C0] net_ratelimit: 19303 callbacks suppressed [ 583.329178][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 583.329213][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 583.336328][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 583.349447][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 583.361168][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 583.373352][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 583.384900][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 583.397259][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 583.408703][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 583.421490][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 584.367930][T12380] device hsr_slave_1 entered promiscuous mode [ 587.992697][ T2635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 588.002057][ T2635] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 588.036471][ T2635] bridge0: port 1(bridge_slave_0) entered blocking state [ 588.043681][ T2635] bridge0: port 1(bridge_slave_0) entered forwarding state [ 588.122066][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 588.136087][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 588.147804][ T23] bridge0: port 2(bridge_slave_1) entered blocking state [ 588.155000][ T23] bridge0: port 2(bridge_slave_1) entered forwarding state [ 588.190824][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 588.239502][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 588.272066][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 588.285096][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 588.319076][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 588.339157][ C1] net_ratelimit: 19243 callbacks suppressed [ 588.339174][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 588.343175][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 588.345849][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 588.357400][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 588.369947][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 588.381592][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 588.393817][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 588.405884][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 588.418174][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 588.429862][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 588.498650][ T7796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 588.507491][ T7796] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 588.561095][T12371] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 588.597690][T12371] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 588.633789][ T7794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 588.647004][ T7794] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 588.678014][ T7794] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 588.707086][ T7794] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 588.717577][ T7794] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 588.779606][T12371] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 588.964985][T12380] 8021q: adding VLAN 0 to HW filter on device bond0 [ 589.035456][T12380] 8021q: adding VLAN 0 to HW filter on device team0 [ 589.072813][ T7791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 589.081189][ T7791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 01:37:05 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x1}, 0xb) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f0000003dc0)=[{{&(0x7f0000000340)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, 0x0}}], 0x1, 0x2000, 0x0) [ 589.107013][ T7791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 589.135527][ T7791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 589.167345][ T7791] bridge0: port 1(bridge_slave_0) entered blocking state [ 589.174573][ T7791] bridge0: port 1(bridge_slave_0) entered forwarding state [ 589.218877][ T7791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 589.248931][ T7791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 589.284778][ T7791] bridge0: port 2(bridge_slave_1) entered blocking state [ 589.291950][ T7791] bridge0: port 2(bridge_slave_1) entered forwarding state [ 589.395805][ T2635] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 589.404044][ T2635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 589.443246][ T2635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 589.454206][ T2635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 589.497311][ T2635] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 589.506559][ T2635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 589.537640][ T2635] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 589.574334][ T2635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 589.584876][ T2635] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 589.622156][ T2635] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 589.638247][T12380] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 589.663716][T12380] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 589.698984][ T7788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 589.707611][ T7788] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 589.758066][T12380] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 590.207871][T12441] device sit0 entered promiscuous mode [ 593.349281][ C1] net_ratelimit: 16781 callbacks suppressed [ 593.349297][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 593.351241][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 593.355861][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 593.367709][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 593.379756][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 593.391352][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 593.403614][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 593.415219][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 593.427499][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 593.439345][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 598.358968][ C0] net_ratelimit: 20152 callbacks suppressed [ 598.358984][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 598.359236][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 598.365157][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 598.377721][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 598.389315][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 598.401026][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 598.413387][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 598.436355][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 598.436940][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 598.449147][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 603.368955][ C1] net_ratelimit: 19735 callbacks suppressed [ 603.368971][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 603.369215][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 603.375509][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 603.387539][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 603.399440][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 603.413485][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 603.425441][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 603.439958][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 603.457797][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 603.464185][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 608.378971][ C1] net_ratelimit: 19897 callbacks suppressed [ 608.378986][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 608.379021][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 608.385199][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 608.397836][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 608.412819][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 608.425194][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 608.437157][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 608.449191][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 608.461746][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 608.480057][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 613.388865][ C0] net_ratelimit: 20266 callbacks suppressed [ 613.388880][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 613.388919][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 613.395064][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 613.406990][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 613.419068][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 613.430962][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 613.443395][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 613.454975][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 613.467203][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 613.479276][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 618.398996][ C1] net_ratelimit: 20615 callbacks suppressed [ 618.399014][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 618.417693][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 618.430280][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 618.442514][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 618.459381][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 618.472090][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 618.484798][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 618.497482][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 618.510489][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 618.523148][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 623.408970][ C1] net_ratelimit: 18108 callbacks suppressed [ 623.408986][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 623.409270][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 623.415698][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 623.427605][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 623.439550][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 623.452063][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 623.464724][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 623.476186][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 623.489009][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 623.500420][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 01:37:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000100)={{0xa, 0x4e20, 0x5, @local, 0x6}, {0xa, 0x4e23, 0x10000, @empty, 0x5}, 0x6, [0x3, 0x100000001, 0x80000000, 0x8, 0x7, 0x7, 0x800, 0x1]}, 0x5c) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'sit0\x00'}) socket$isdn(0x22, 0x3, 0x0) pipe(0x0) socket$can_raw(0x1d, 0x3, 0x1) syz_genetlink_get_family_id$tipc(&(0x7f0000000600)='TIPC\x00') recvfrom$inet6(r0, &(0x7f0000000180)=""/171, 0xab, 0x140, 0x0, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x24, 0x0, 0x18, 0x70bd28, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x1000}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x4044}, 0x48000) r1 = socket$inet6(0xa, 0x7, 0x1) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x6}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000240)={r2, 0x7, 0x5, [0x7, 0x180000000, 0xfffffffffffffff9, 0x4e1, 0x5]}, &(0x7f0000000280)=0x12) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'sit0\x00\x00\x00\x00\x82\x00\xfc\x00', 0x141}) 01:37:42 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x7) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000005600)=[@in6={0xa, 0x0, 0x2, @ipv4={[], [], @multicast1}, 0xff2}], 0x1c) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, &(0x7f00000054c0)) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000005500)={0x0, 0xc00000000000000}, 0x8) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000740)='bcsf0\x00') accept(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, 0x0) 01:37:42 executing program 0: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010004e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) 01:37:42 executing program 2: r0 = socket$inet6(0xa, 0x200000000000001, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x3e, 0x0, &(0x7f0000000000)) 01:37:42 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x1}, 0xb) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f0000003dc0)=[{{&(0x7f0000000340)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, 0x0}}], 0x1, 0x2000, 0x0) 01:37:42 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000100)={{0xa, 0x4e20, 0x5, @local, 0x6}, {0xa, 0x4e23, 0x10000, @empty, 0x5}, 0x6, [0x3, 0x100000001, 0x80000000, 0x8, 0x7, 0x7, 0x800, 0x1]}, 0x5c) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'sit0\x00'}) socket$isdn(0x22, 0x3, 0x0) pipe(0x0) socket$can_raw(0x1d, 0x3, 0x1) syz_genetlink_get_family_id$tipc(&(0x7f0000000600)='TIPC\x00') recvfrom$inet6(r0, &(0x7f0000000180)=""/171, 0xab, 0x140, 0x0, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x24, 0x0, 0x18, 0x70bd28, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x1000}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x4044}, 0x48000) r1 = socket$inet6(0xa, 0x7, 0x1) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x6}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000240)={r2, 0x7, 0x5, [0x7, 0x180000000, 0xfffffffffffffff9, 0x4e1, 0x5]}, &(0x7f0000000280)=0x12) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'sit0\x00\x00\x00\x00\x82\x00\xfc\x00', 0x141}) 01:37:43 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x75, &(0x7f0000000140)={r1}, &(0x7f0000000000)=0x90) [ 627.675053][T12448] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 627.714867][T12454] device sit0 left promiscuous mode 01:37:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x3, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x42, 0x0, &(0x7f00000004c0)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ee300e700e8d5000000010000001400000500242f09880bd320d98a61a900655844d8d5212d4c435a", 0x0}, 0x28) 01:37:44 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x1}, 0xb) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f0000003dc0)=[{{&(0x7f0000000340)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, 0x0}}], 0x1, 0x2000, 0x0) 01:37:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x3, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x42, 0x0, &(0x7f00000004c0)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ee300e700e8d5000000010000001400000500242f09880bd320d98a61a900655844d8d5212d4c435a", 0x0}, 0x28) 01:37:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr=0xfffffffffffffffb}}) 01:37:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x3, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x42, 0x0, &(0x7f00000004c0)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ee300e700e8d5000000010000001400000500242f09880bd320d98a61a900655844d8d5212d4c435a", 0x0}, 0x28) [ 628.420648][ C0] net_ratelimit: 14279 callbacks suppressed [ 628.420663][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 628.421204][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 628.427303][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 628.439251][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 628.451097][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 628.463010][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 628.475002][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 628.486932][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 628.498883][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 628.510755][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 632.096398][T12456] device sit0 left promiscuous mode [ 632.321148][T12473] device sit0 entered promiscuous mode [ 632.662564][T12475] device sit0 entered promiscuous mode [ 633.429126][ C1] net_ratelimit: 14075 callbacks suppressed [ 633.429141][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 633.429164][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 633.435774][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 633.448650][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 633.461094][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 633.472713][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 633.485328][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 633.497208][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 633.509155][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 633.520944][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 638.439057][ C1] net_ratelimit: 17897 callbacks suppressed [ 638.439074][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 638.439195][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 638.445616][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 638.457553][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 638.470021][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 638.482192][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 638.495675][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 638.509541][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 638.522423][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 638.533938][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 643.449107][ C1] net_ratelimit: 20609 callbacks suppressed [ 643.449133][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 643.449313][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 643.455341][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 643.467753][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 643.479822][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 643.491828][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 643.504895][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 643.518516][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 643.540425][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 643.547559][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 648.459191][ C1] net_ratelimit: 18555 callbacks suppressed [ 648.459206][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 648.459213][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 648.459356][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 648.465357][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 648.477536][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 648.489560][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 648.501510][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 648.513918][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 648.525955][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 648.537889][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 653.468981][ C0] net_ratelimit: 19686 callbacks suppressed [ 653.468996][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 653.469024][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 653.475317][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 653.487924][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 653.500058][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 653.512932][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 653.524785][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 653.537670][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 653.549951][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 653.563144][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 658.478954][ C0] net_ratelimit: 18839 callbacks suppressed [ 658.478969][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 658.479224][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 658.485152][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 658.497001][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 658.509081][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 658.521242][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 658.533339][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 658.544934][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 658.556833][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 658.568985][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 663.489149][ C1] net_ratelimit: 19033 callbacks suppressed [ 663.489163][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 663.489271][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 663.496189][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 663.507781][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 663.520773][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 663.532683][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 663.546312][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 663.559268][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 663.573880][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 663.588712][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 668.499004][ C0] net_ratelimit: 20117 callbacks suppressed [ 668.499019][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 668.499285][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 668.505262][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 668.517721][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 668.529515][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 668.541401][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 668.553308][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 668.565456][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 668.576990][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 668.589276][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 673.509155][ C0] net_ratelimit: 20099 callbacks suppressed [ 673.509171][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 673.527499][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 673.539989][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 673.552586][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 673.562022][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 673.564725][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 673.577026][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 673.588644][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 673.600860][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 673.612498][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 677.566489][ T78] device bridge_slave_1 left promiscuous mode [ 677.592856][ T78] bridge0: port 2(bridge_slave_1) entered disabled state [ 678.519009][ C0] net_ratelimit: 20070 callbacks suppressed [ 678.519025][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 678.521183][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 678.526125][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 678.539108][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 678.551003][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 678.562894][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 678.576230][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 678.588152][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 678.601069][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 678.613308][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 679.540685][ T78] device bridge_slave_0 left promiscuous mode [ 679.547161][ T78] bridge0: port 1(bridge_slave_0) entered disabled state [ 682.983571][ T78] device bridge_slave_1 left promiscuous mode [ 682.997892][ T78] bridge0: port 2(bridge_slave_1) entered disabled state [ 683.183754][ T78] device bridge_slave_0 left promiscuous mode [ 683.205414][ T78] bridge0: port 1(bridge_slave_0) entered disabled state [ 683.529316][ C0] net_ratelimit: 20687 callbacks suppressed [ 683.529334][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 683.529388][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 683.535937][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 683.547821][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 683.565534][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 683.571863][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 683.583882][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 683.598450][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 683.608040][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 683.620216][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 688.539009][ C0] net_ratelimit: 17461 callbacks suppressed [ 688.539024][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 688.539102][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 688.545363][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 688.557905][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 688.569699][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 688.581705][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 688.595447][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 688.605639][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 688.617208][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 688.629640][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 693.549034][ C1] net_ratelimit: 15145 callbacks suppressed [ 693.549049][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 693.552509][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 693.556016][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 693.567490][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 693.579429][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 693.591257][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 693.603163][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 693.615408][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 693.627182][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 693.639331][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 698.559113][ C1] net_ratelimit: 15788 callbacks suppressed [ 698.559128][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 698.559178][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 698.565672][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 698.577787][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 698.590090][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 698.601512][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 698.613632][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 698.625197][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 698.637473][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 698.649292][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 699.568538][ T78] device hsr_slave_1 left promiscuous mode [ 700.014027][ T78] device hsr_slave_0 left promiscuous mode [ 700.686947][ T78] team0 (unregistering): Port device team_slave_1 removed [ 701.036474][ T78] team0 (unregistering): Port device team_slave_0 removed [ 701.356380][ T78] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 703.568939][ C0] net_ratelimit: 18875 callbacks suppressed [ 703.568959][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 703.569060][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 703.575131][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 703.587115][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 703.599132][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 703.611567][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 703.623488][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 703.635476][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 703.646966][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 703.670969][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 703.706541][ T78] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 708.578973][ C1] net_ratelimit: 19219 callbacks suppressed [ 708.578988][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 708.591072][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 708.597561][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 708.609274][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 708.621190][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 708.633332][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 708.645240][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 708.657123][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 708.669524][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 708.680932][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 709.081596][ T78] bond0 (unregistering): Released all slaves [ 713.589303][ C1] net_ratelimit: 20393 callbacks suppressed [ 713.589318][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 713.608169][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 713.620856][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 713.626692][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 713.645577][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 713.657866][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 713.670347][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 713.683040][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 713.689370][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 713.695622][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 716.219552][ T78] device hsr_slave_1 left promiscuous mode [ 718.599143][ C1] net_ratelimit: 20585 callbacks suppressed [ 718.599171][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 718.599393][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 718.605476][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 718.617274][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 718.629824][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 718.641241][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 718.654196][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 718.665330][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 718.677568][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 718.700595][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 719.265594][ T78] device hsr_slave_0 left promiscuous mode [ 723.609068][ C0] net_ratelimit: 20864 callbacks suppressed [ 723.609086][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 723.609343][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 723.615245][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 723.627871][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 723.641003][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 723.655464][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 723.667106][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 723.679855][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 723.692439][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 723.705212][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 725.364600][ T78] team0 (unregistering): Port device team_slave_1 removed [ 725.629098][ T78] team0 (unregistering): Port device team_slave_0 removed [ 725.880945][ T78] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 727.600837][ T78] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 728.263081][ T78] bond0 (unregistering): Released all slaves [ 728.618882][ C1] net_ratelimit: 18625 callbacks suppressed [ 728.618899][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 728.619082][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 728.625459][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 728.637573][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 728.650036][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 728.661437][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 728.673970][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 728.685698][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 728.697843][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 728.710158][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 733.628893][ C1] net_ratelimit: 21298 callbacks suppressed [ 733.628908][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 733.629228][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 733.635445][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 733.647501][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 733.659369][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 733.671152][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 733.686616][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 733.694912][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 733.707106][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 733.718824][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 01:39:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000100)={{0xa, 0x4e20, 0x5, @local, 0x6}, {0xa, 0x4e23, 0x10000, @empty, 0x5}, 0x6, [0x3, 0x100000001, 0x80000000, 0x8, 0x7, 0x7, 0x800, 0x1]}, 0x5c) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'sit0\x00'}) socket$isdn(0x22, 0x3, 0x0) pipe(0x0) socket$can_raw(0x1d, 0x3, 0x1) syz_genetlink_get_family_id$tipc(&(0x7f0000000600)='TIPC\x00') recvfrom$inet6(r0, &(0x7f0000000180)=""/171, 0xab, 0x140, 0x0, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x24, 0x0, 0x18, 0x70bd28, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x1000}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x4044}, 0x48000) r1 = socket$inet6(0xa, 0x7, 0x1) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x6}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000240)={r2, 0x7, 0x5, [0x7, 0x180000000, 0xfffffffffffffff9, 0x4e1, 0x5]}, &(0x7f0000000280)=0x12) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'sit0\x00\x00\x00\x00\x82\x00\xfc\x00', 0x141}) 01:39:33 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x7) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000005600)=[@in6={0xa, 0x0, 0x2, @ipv4={[], [], @multicast1}, 0xff2}], 0x1c) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, &(0x7f00000054c0)) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000005500)={0x0, 0xc00000000000000}, 0x8) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000740)='bcsf0\x00') accept(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, 0x0) 01:39:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x3, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x42, 0x0, &(0x7f00000004c0)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ee300e700e8d5000000010000001400000500242f09880bd320d98a61a900655844d8d5212d4c435a", 0x0}, 0x28) 01:39:33 executing program 2: r0 = socket$inet(0xa, 0x6, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x2, 0x2c8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000240], 0x0, &(0x7f0000000080), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x1d, 0x0, 0x0, '\x00', '\x00', '\x00', '\x00', @dev, [], @local={[], 0xffffffffffffffff}, [], 0x120, 0x150, 0x115, [@mark_m={'mark_m\x00', 0x18}, @stp={'stp\x00', 0x48, {{0x0, {0x0, 0x0, 0x0, @link_local, [], 0x0, 0x0, 0x0, 0x0, @local={[], 0xffffffffffffffff}}}}}]}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}, {{{0x0, 0x0, 0x0, '\x00', '\x00', '\x00', '\x00', @empty, [], @empty, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}]}, 0x340) 01:39:33 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x3) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}, 0x10000}, 0x1c) [ 738.639309][ C1] net_ratelimit: 17301 callbacks suppressed [ 738.639326][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 738.639627][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 738.646318][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 738.657867][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 738.670159][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 738.681991][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 738.717771][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 738.730322][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 738.742853][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 738.755134][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 01:39:36 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x3) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}, 0x10000}, 0x1c) 01:39:36 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a28093", 0x10}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x325, &(0x7f0000000100)}], 0x492492492492805, 0x0) 01:39:36 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x10000, &(0x7f0000004200)={0x0, 0x989680}) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg(r0, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x3aebf4e, 0x0) 01:39:36 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x7) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000005600)=[@in6={0xa, 0x0, 0x2, @ipv4={[], [], @multicast1}, 0xff2}], 0x1c) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, &(0x7f00000054c0)) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000005500)={0x0, 0xc00000000000000}, 0x8) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000740)='bcsf0\x00') accept(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, 0x0) 01:39:36 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x800448d2, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00'}) 01:39:36 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x3) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}, 0x10000}, 0x1c) 01:39:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$netlink(0x10, 0x3, 0x4) write(r2, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xe, &(0x7f0000000040)=0x3ff, 0x4) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) recvmmsg(r2, &(0x7f0000006500), 0x2c7, 0x40010000, &(0x7f0000006700)={0x0, r3+30000000}) [ 743.649226][ C0] net_ratelimit: 16890 callbacks suppressed [ 743.649241][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 743.649248][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 743.649725][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 743.655458][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 743.672571][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 743.680071][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 743.691794][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 743.703999][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 743.715710][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 743.727678][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 748.658990][ C0] net_ratelimit: 21688 callbacks suppressed [ 748.659006][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 748.659206][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 748.665756][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 748.677749][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 748.689326][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 748.701318][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 748.713302][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 748.735281][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 748.737155][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 748.749456][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 753.669070][ C0] net_ratelimit: 21758 callbacks suppressed [ 753.669086][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 753.669212][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 753.675923][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 753.687559][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 753.699589][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 753.711453][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 753.723616][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 753.735330][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 753.747576][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 753.759235][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 758.679275][ C1] net_ratelimit: 21041 callbacks suppressed [ 758.679294][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 758.679359][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 758.685605][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 758.697770][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 758.709802][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 758.721831][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 758.734388][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 758.745567][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 758.757883][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 758.769466][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 763.689134][ C0] net_ratelimit: 21768 callbacks suppressed [ 763.689149][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 763.707635][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 763.720332][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 763.732920][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 763.745202][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 763.757788][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 763.770359][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 763.782759][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 763.795656][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 763.808224][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 768.699155][ C0] net_ratelimit: 19410 callbacks suppressed [ 768.699170][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 768.699209][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 768.706240][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 768.724192][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 768.732638][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 768.745219][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 768.758528][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 768.770282][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 768.782858][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 768.794893][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 773.708929][ C0] net_ratelimit: 20298 callbacks suppressed [ 773.708944][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 773.709112][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 773.715582][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 773.727554][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 773.740039][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 773.751588][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 773.763553][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 773.777431][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 773.790060][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 773.803290][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 778.719080][ C1] net_ratelimit: 21582 callbacks suppressed [ 778.719096][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 778.719389][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 778.725647][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 778.737612][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 778.749550][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 778.761406][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 778.773743][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 778.785172][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 778.797033][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 778.809255][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 783.728995][ C1] net_ratelimit: 20205 callbacks suppressed [ 783.729010][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 783.729098][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 783.735558][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 783.752598][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 783.764952][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 783.779059][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 783.796975][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 783.803251][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 783.815545][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 783.827563][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 787.661776][T12543] IPVS: ftp: loaded support on port[0] = 21 [ 787.664788][T12516] IPVS: ftp: loaded support on port[0] = 21 [ 787.966634][T12543] chnl_net:caif_netlink_parms(): no params data found [ 788.078490][T12543] bridge0: port 1(bridge_slave_0) entered blocking state [ 788.111057][T12543] bridge0: port 1(bridge_slave_0) entered disabled state [ 788.121029][T12543] device bridge_slave_0 entered promiscuous mode [ 788.152315][T12543] bridge0: port 2(bridge_slave_1) entered blocking state [ 788.179289][T12543] bridge0: port 2(bridge_slave_1) entered disabled state [ 788.187675][T12543] device bridge_slave_1 entered promiscuous mode [ 788.318875][T12543] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 788.339585][T12543] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 788.357609][T12516] chnl_net:caif_netlink_parms(): no params data found [ 788.396916][T12543] team0: Port device team_slave_0 added [ 788.444394][T12543] team0: Port device team_slave_1 added [ 788.739307][ C0] net_ratelimit: 16808 callbacks suppressed [ 788.739323][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 788.739745][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 788.745897][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 788.758326][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 788.770624][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 788.784890][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 788.797357][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 788.810807][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 788.822106][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 788.837673][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 790.840654][T12543] device hsr_slave_0 entered promiscuous mode [ 791.829970][T12543] device hsr_slave_1 entered promiscuous mode [ 793.378642][T12516] bridge0: port 1(bridge_slave_0) entered blocking state [ 793.418919][T12516] bridge0: port 1(bridge_slave_0) entered disabled state [ 793.678972][T12516] device bridge_slave_0 entered promiscuous mode [ 793.748892][ C0] net_ratelimit: 20380 callbacks suppressed [ 793.748907][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 793.749167][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 793.755409][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 793.767110][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 793.780585][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 793.792733][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 793.804637][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 793.817142][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 793.829105][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 793.842463][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 794.450892][T12516] bridge0: port 2(bridge_slave_1) entered blocking state [ 794.458018][T12516] bridge0: port 2(bridge_slave_1) entered disabled state [ 794.480633][T12516] device bridge_slave_1 entered promiscuous mode [ 794.565816][T12516] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 794.595788][T12516] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 794.684645][T12516] team0: Port device team_slave_0 added [ 794.723063][T12543] 8021q: adding VLAN 0 to HW filter on device bond0 [ 794.731931][T12516] team0: Port device team_slave_1 added [ 794.787807][T12543] 8021q: adding VLAN 0 to HW filter on device team0 [ 794.806110][ T7791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 794.814177][ T7791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 797.932025][T12516] device hsr_slave_0 entered promiscuous mode [ 798.342973][T12516] device hsr_slave_1 entered promiscuous mode [ 798.759070][ C0] net_ratelimit: 20443 callbacks suppressed [ 798.759086][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 798.759283][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 798.765540][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 798.777968][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 798.789493][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 798.803379][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 798.815858][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 798.827594][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 798.839663][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 798.851911][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 799.319073][T12498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 799.390842][T12498] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 799.476395][T12498] bridge0: port 1(bridge_slave_0) entered blocking state [ 799.483560][T12498] bridge0: port 1(bridge_slave_0) entered forwarding state [ 799.521428][T12498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 799.575800][T12498] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 799.602996][T12498] bridge0: port 2(bridge_slave_1) entered blocking state [ 799.610889][T12498] bridge0: port 2(bridge_slave_1) entered forwarding state [ 799.641171][T12498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 799.990645][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 799.998653][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 800.036587][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 800.063534][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 800.072268][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 800.094898][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 800.103622][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 800.141063][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 800.176571][T12543] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 800.200861][T12543] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 800.235282][T12498] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 800.243931][T12498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 800.252903][T12498] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 800.287592][T12543] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 803.768866][ C1] net_ratelimit: 20425 callbacks suppressed [ 803.768882][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 803.769012][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 803.776487][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 803.788768][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 803.801330][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 803.816478][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 803.829026][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 803.841416][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 803.854302][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 803.866410][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 806.877098][T12557] IPVS: ftp: loaded support on port[0] = 21 [ 807.048728][T12557] chnl_net:caif_netlink_parms(): no params data found [ 807.139368][T12557] bridge0: port 1(bridge_slave_0) entered blocking state [ 807.146600][T12557] bridge0: port 1(bridge_slave_0) entered disabled state [ 807.162407][T12557] device bridge_slave_0 entered promiscuous mode [ 807.195072][T12557] bridge0: port 2(bridge_slave_1) entered blocking state [ 807.202324][T12557] bridge0: port 2(bridge_slave_1) entered disabled state [ 807.235908][T12557] device bridge_slave_1 entered promiscuous mode [ 807.257807][T12557] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 807.298168][T12557] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 807.326483][T12557] team0: Port device team_slave_0 added [ 807.365159][T12557] team0: Port device team_slave_1 added [ 808.778863][ C0] net_ratelimit: 18718 callbacks suppressed [ 808.778881][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 808.779030][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 808.786286][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 808.798435][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 808.810128][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 808.822939][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 808.835714][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 808.851072][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 808.869835][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 808.882352][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 810.034141][T12557] device hsr_slave_0 entered promiscuous mode [ 812.486370][T12557] device hsr_slave_1 entered promiscuous mode [ 813.788936][ C0] net_ratelimit: 21220 callbacks suppressed [ 813.788952][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 813.789058][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 813.795072][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 813.807467][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 813.820221][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 813.832671][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 813.844101][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 813.856094][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 813.868984][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:1e:b6:4b:b5:d4, vlan:0) [ 813.880638][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 817.349553][T12557] 8021q: adding VLAN 0 to HW filter on device bond0 [ 817.385375][ T2635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 817.393811][ T2635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 817.419161][T12557] 8021q: adding VLAN 0 to HW filter on device team0 [ 817.442531][T12498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 817.452148][T12498] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 817.476962][T12498] bridge0: port 1(bridge_slave_0) entered blocking state [ 817.484152][T12498] bridge0: port 1(bridge_slave_0) entered forwarding state [ 817.533991][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 817.542857][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 817.565851][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 817.594594][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 817.601792][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 817.622111][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 817.644357][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 817.653808][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 817.676786][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 817.699730][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 817.721746][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 817.743941][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 817.753099][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 817.781513][T12557] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 817.814663][T12557] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 817.823408][T12498] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 817.832327][T12498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 817.859436][T12498] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 817.897938][T12557] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 818.420415][T12570] device sit0 entered promiscuous mode [ 818.799151][ C1] net_ratelimit: 18808 callbacks suppressed [ 818.799167][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 818.799365][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 818.805837][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 818.818025][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 818.829791][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 818.842241][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 818.854169][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 818.868172][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 818.879672][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 818.891972][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 823.809072][ C1] net_ratelimit: 19645 callbacks suppressed [ 823.809091][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 823.813698][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 823.816334][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 823.828176][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 823.840077][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 823.852222][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 823.864454][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 823.876616][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 823.888716][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 823.900805][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 828.818868][ C1] net_ratelimit: 21374 callbacks suppressed [ 828.818894][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 828.818960][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 828.825420][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 828.837470][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 828.849740][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 828.864034][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 828.876394][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 828.889565][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 828.901752][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 828.913814][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 829.991516][ T78] device veth0_to_bridge left promiscuous mode [ 829.997881][ T78] bridge0: port 3(veth0_to_bridge) entered disabled state [ 831.707674][ T78] device bridge_slave_1 left promiscuous mode [ 831.719973][ T78] bridge0: port 2(bridge_slave_1) entered disabled state [ 831.810940][ T78] device bridge_slave_0 left promiscuous mode [ 831.817455][ T78] bridge0: port 1(bridge_slave_0) entered disabled state [ 832.134388][ T78] device bridge_slave_1 left promiscuous mode [ 832.152562][ T78] bridge0: port 2(bridge_slave_1) entered disabled state [ 833.828951][ C1] net_ratelimit: 21457 callbacks suppressed [ 833.828967][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 833.828987][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 833.835174][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 833.847522][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 833.859138][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 833.871319][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 833.882886][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 833.894814][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 833.906750][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 833.918914][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 834.653200][ T78] device bridge_slave_0 left promiscuous mode [ 834.682056][ T78] bridge0: port 1(bridge_slave_0) entered disabled state [ 838.839124][ C0] net_ratelimit: 16975 callbacks suppressed [ 838.839138][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 838.839162][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 838.846745][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 838.861581][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 838.874047][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 838.885645][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 838.897987][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 838.909767][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 838.922288][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 838.934442][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 842.260134][ T78] device hsr_slave_1 left promiscuous mode [ 842.336934][ T78] device hsr_slave_0 left promiscuous mode [ 842.440501][ T78] team0 (unregistering): Port device team_slave_1 removed [ 842.488136][ T78] team0 (unregistering): Port device team_slave_0 removed [ 842.533563][ T78] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 843.285374][ T78] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 843.537701][ T78] bond0 (unregistering): Released all slaves [ 843.848994][ C1] net_ratelimit: 16625 callbacks suppressed [ 843.849009][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 843.850714][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 843.858313][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 843.871201][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 843.885157][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 843.898063][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 843.910076][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 843.924287][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 843.936543][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 843.949537][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 843.993337][ T78] device hsr_slave_1 left promiscuous mode [ 844.886160][ T78] device hsr_slave_0 left promiscuous mode [ 844.954432][ T78] team0 (unregistering): Port device team_slave_1 removed [ 845.006239][ T78] team0 (unregistering): Port device team_slave_0 removed [ 845.046681][ T78] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 845.151204][ T78] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 845.408388][ T78] bond0 (unregistering): Released all slaves [ 848.859062][ C0] net_ratelimit: 20608 callbacks suppressed [ 848.859078][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 848.859313][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 848.865631][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 848.877422][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 848.890201][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 848.901784][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 848.914126][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 848.925959][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 848.937608][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 848.950735][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 853.869184][ C0] net_ratelimit: 21303 callbacks suppressed [ 853.869200][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 853.869559][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 853.875821][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 853.893167][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 853.905286][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 853.917771][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 853.929527][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 853.941084][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 853.953563][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 853.965037][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 858.878907][ C1] net_ratelimit: 18621 callbacks suppressed [ 858.878922][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 858.878975][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 858.885702][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 858.898566][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 858.909964][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 858.922416][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 858.934077][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 858.947834][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 858.959777][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 858.971879][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 01:41:35 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a28093", 0x10}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x325, &(0x7f0000000100)}], 0x492492492492805, 0x0) 01:41:35 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x3) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}, 0x10000}, 0x1c) 01:41:35 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x10000, &(0x7f0000004200)={0x0, 0x989680}) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg(r0, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x3aebf4e, 0x0) 01:41:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$netlink(0x10, 0x3, 0x4) write(r2, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xe, &(0x7f0000000040)=0x3ff, 0x4) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) recvmmsg(r2, &(0x7f0000006500), 0x2c7, 0x40010000, &(0x7f0000006700)={0x0, r3+30000000}) 01:41:35 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x10000, &(0x7f0000004200)={0x0, 0x989680}) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg(r0, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x3aebf4e, 0x0) 01:41:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback=0x7f000009}, {0x20000000304, @remote}, 0x0, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 01:41:35 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='scalable\x00', 0x9) sendto$inet(r0, 0x0, 0xffffffffffffff89, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x10084e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff012}], 0x1, &(0x7f0000000200)=""/20, 0xc2b}, 0x300) 01:41:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback=0x7f000009}, {0x20000000304, @remote}, 0x0, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 01:41:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback=0x7f000009}, {0x20000000304, @remote}, 0x0, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 01:41:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$netlink(0x10, 0x3, 0x4) write(r2, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xe, &(0x7f0000000040)=0x3ff, 0x4) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) recvmmsg(r2, &(0x7f0000006500), 0x2c7, 0x40010000, &(0x7f0000006700)={0x0, r3+30000000}) 01:41:36 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a28093", 0x10}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x325, &(0x7f0000000100)}], 0x492492492492805, 0x0) 01:41:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback=0x7f000009}, {0x20000000304, @remote}, 0x0, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 01:41:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$netlink(0x10, 0x3, 0x4) write(r2, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xe, &(0x7f0000000040)=0x3ff, 0x4) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) recvmmsg(r2, &(0x7f0000006500), 0x2c7, 0x40010000, &(0x7f0000006700)={0x0, r3+30000000}) 01:41:36 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x3) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xfffc, 0x0, 0x54}, 0x98) 01:41:37 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x10000, &(0x7f0000004200)={0x0, 0x989680}) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg(r0, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x3aebf4e, 0x0) 01:41:37 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a28093", 0x10}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x325, &(0x7f0000000100)}], 0x492492492492805, 0x0) 01:41:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0x3000000}, [@nested={0x4, 0xe}]}, 0x18}}, 0x0) 01:41:37 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x10000, &(0x7f0000004200)={0x0, 0x989680}) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg(r0, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x3aebf4e, 0x0) 01:41:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x1, 0x300, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x4, 0x88f7, 'gre0\x00', 'bpq0\x00', 'erspan0\x00', 'eql\x00', @empty, [0x0, 0x0, 0x0, 0xff], @remote, [], 0x198, 0x1f8, 0x270, [@comment={'comment\x00', 0x100}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x80000001}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x3f, 0x0, 0xdda1, 0x1, 0x0, "11a1ce259c76c98bc9f3f434ac55545cf4d1a16d7a637906dfed7f0e9388a30bdcd138a356bb5624327dbfdb7a07896af639ffd6edae0ec19f656dfb496fea8a"}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x378) 01:41:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000000)=@req={0x80000001}, 0x10) close(r1) 01:41:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0xffffffff00000000, 0xd0, &(0x7f0000000000), 0x4) 01:41:37 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet6_int(r0, 0x28, 0xde, &(0x7f0000000000), &(0x7f0000000100)=0x4) 01:41:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) 01:41:37 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00001dcf48)=ANY=[@ANYBLOB="02030003160000000000000000000000040009000000000000000000000000000000000000000000000000000000000005000600000000000a0000000000000000000000000000000000000000000000000000000000000004000400000340000800000000000000000000000000000000000000000000000200010000000000000000000000000005000500000000000a00000000000000fe8000000000000000000000000000ff0000000000000000"], 0xb0}}, 0x0) [ 863.888923][ C0] net_ratelimit: 13074 callbacks suppressed [ 863.888940][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 863.889305][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 863.895883][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 863.908261][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 863.921309][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 863.934010][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 863.946451][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 863.958061][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 863.970218][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 863.985094][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) 01:41:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f0000000080)=@ethtool_ts_info={0xe}}) 01:41:40 executing program 3: r0 = socket$packet(0x11, 0xa, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000000)=0xfffffffffffffffa, 0x4) syz_emit_ethernet(0x2c, &(0x7f0000000280)={@broadcast, @broadcast, [], {@ipx={0x8137, {0xffff, 0x1e, 0x0, 0x0, {@random, @broadcast}, {@current, @random="97431655696a"}}}}}, 0x0) 01:41:40 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x10000, &(0x7f0000004200)={0x0, 0x989680}) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg(r0, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x3aebf4e, 0x0) 01:41:40 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x10000, &(0x7f0000004200)={0x0, 0x989680}) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg(r0, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x3aebf4e, 0x0) 01:41:40 executing program 0: r0 = socket(0xa, 0x80005, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000000)={'team0\x00', 0x892}) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000240)={'team0\x00@\xff\xff\xfd\x00 \x00', 0xb5}) 01:41:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002200815fe45ac187185095cf0600b0eba0b4d65cdbaa98cbb30007fff00000000000000051894d5d1dac", 0x2e}], 0x1}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000000000000000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f000000b800)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 01:41:40 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1, 0x0, 0x0, 0x56}, 0x98) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80800) 01:41:40 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmmsg(r0, &(0x7f0000007f80)=[{{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)}}, {{&(0x7f00000016c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001a00), 0x0, &(0x7f0000001a80)=[{0x10, 0x1, 0x1}], 0x10}}], 0x2, 0x0) [ 864.502346][T12670] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 01:41:40 executing program 0: r0 = socket(0xa, 0x80005, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000000)={'team0\x00', 0x892}) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000240)={'team0\x00@\xff\xff\xfd\x00 \x00', 0xb5}) 01:41:41 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmmsg(r0, &(0x7f0000007f80)=[{{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)}}, {{&(0x7f00000016c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001a00), 0x0, &(0x7f0000001a80)=[{0x10, 0x1, 0x1}], 0x10}}], 0x2, 0x0) 01:41:41 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmmsg(r0, &(0x7f0000007f80)=[{{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)}}, {{&(0x7f00000016c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001a00), 0x0, &(0x7f0000001a80)=[{0x10, 0x1, 0x1}], 0x10}}], 0x2, 0x0) 01:41:41 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1, 0x0, 0x0, 0x56}, 0x98) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80800) 01:41:41 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmmsg(r0, &(0x7f0000007f80)=[{{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)}}, {{&(0x7f00000016c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001a00), 0x0, &(0x7f0000001a80)=[{0x10, 0x1, 0x1}], 0x10}}], 0x2, 0x0) 01:41:41 executing program 5: r0 = socket(0xa, 0x80005, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000000)={'team0\x00', 0x892}) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000240)={'team0\x00@\xff\xff\xfd\x00 \x00', 0xb5}) 01:41:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x44, r2, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}]}]}, 0x44}}, 0x0) 01:41:42 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1, 0x0, 0x0, 0x56}, 0x98) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80800) 01:41:42 executing program 2: r0 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req={0xff, 0x0, 0x0, 0xfff}, 0x1b4) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) [ 866.797405][T12698] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 866.966773][T12715] IPVS: Unknown mcast interface: syzkaller1 01:41:43 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x1, 0x0, 0x0, 0x56}, 0x98) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80800) 01:41:43 executing program 2: r0 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req={0xff, 0x0, 0x0, 0xfff}, 0x1b4) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 01:41:43 executing program 0: r0 = socket(0xa, 0x80005, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000000)={'team0\x00', 0x892}) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000240)={'team0\x00@\xff\xff\xfd\x00 \x00', 0xb5}) 01:41:43 executing program 5: r0 = socket(0xa, 0x80005, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000000)={'team0\x00', 0x892}) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000240)={'team0\x00@\xff\xff\xfd\x00 \x00', 0xb5}) 01:41:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f023c123f3188a070") mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f00000009c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)="2c0271ca8b080aae3300bfa4def38003c21c104094", 0x15}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000002e00)="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", 0x2b7}], 0x1}, 0x8000) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000a00)="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", 0x2d5}], 0x1}, 0x0) 01:41:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002200815fe45ac187185095cf0600b0eba0b4d65cdbaa98cbb30007fff00000000000000051894d5d1dac", 0x2e}], 0x1}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000000000000000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f000000b800)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 01:41:43 executing program 2: r0 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req={0xff, 0x0, 0x0, 0xfff}, 0x1b4) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) [ 867.163392][T12735] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 01:41:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002200815fe45ac187185095cf0600b0eba0b4d65cdbaa98cbb30007fff00000000000000051894d5d1dac", 0x2e}], 0x1}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000000000000000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f000000b800)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 01:41:43 executing program 2: r0 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req={0xff, 0x0, 0x0, 0xfff}, 0x1b4) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 01:41:43 executing program 0: r0 = socket(0xa, 0x80005, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000000)={'team0\x00', 0x892}) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000240)={'team0\x00@\xff\xff\xfd\x00 \x00', 0xb5}) 01:41:43 executing program 5: r0 = socket(0xa, 0x80005, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000000)={'team0\x00', 0x892}) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000240)={'team0\x00@\xff\xff\xfd\x00 \x00', 0xb5}) [ 867.426671][T12749] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 01:41:43 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x8, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x5f, 0x6a, 0xa, 0xff00}}, &(0x7f0000000180)='GPL\x00', 0x5, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 01:41:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x5a) connect$inet(r1, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) 01:41:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002200815fe45ac187185095cf0600b0eba0b4d65cdbaa98cbb30007fff00000000000000051894d5d1dac", 0x2e}], 0x1}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000000000000000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f000000b800)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) [ 867.795482][T12771] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 01:41:44 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000200)={0x0, 0xfffffffffffbff48}, 0x8) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x77, &(0x7f0000000100), 0x8) 01:41:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000009c0)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000000040)=0x800, 0x4) bind$xdp(r2, &(0x7f0000000300)={0x2c, 0x1, r1, 0x0, 0xffffffffffffff9c}, 0x10) 01:41:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_percpu\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x6ff, 0x2, 0x3, 0x1, 0x4}, &(0x7f00000001c0)=0x14) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000200)={r3, 0xb24d, 0x8, [0x1, 0x800, 0x7f, 0xc655, 0x3ff, 0xef9, 0x7, 0x200]}, &(0x7f0000000240)=0x18) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) 01:41:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1}, 0x0) 01:41:44 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x2, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x8, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x2d61}}}, 0xb8}}, 0x0) 01:41:44 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002200815fe45ac187185095cf0600b0eba0b4d65cdbaa98cbb30007fff00000000000000051894d5d1dac", 0x2e}], 0x1}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000000000000000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f000000b800)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 01:41:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002200815fe45ac187185095cf0600b0eba0b4d65cdbaa98cbb30007fff00000000000000051894d5d1dac", 0x2e}], 0x1}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000000000000000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f000000b800)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 01:41:44 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) [ 868.328690][T12803] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 01:41:45 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000200)={0x0, 0xfffffffffffbff48}, 0x8) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x77, &(0x7f0000000100), 0x8) [ 868.906427][ C1] net_ratelimit: 8702 callbacks suppressed [ 868.906441][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 868.909663][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 868.913267][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 868.925193][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 868.937754][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 868.950547][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 868.962883][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 868.975064][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 868.987809][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 868.999650][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 01:41:45 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 01:41:45 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 01:41:46 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000200)={0x0, 0xfffffffffffbff48}, 0x8) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x77, &(0x7f0000000100), 0x8) 01:41:46 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 01:41:46 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x33, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0xdbd, 0x9, 0xf74a, 0xfffffff800000000}}, &(0x7f00000002c0)=0xb0) ioctl$FICLONE(r3, 0x40049409, r3) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000001980)={0x8001, 0x100000001, 0x0, 0x803}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000280)={'bcsf0\x00', {0x2, 0x4e22, @multicast1}}) r4 = socket$rds(0x15, 0x5, 0x0) bind$alg(r3, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) getpeername(r3, &(0x7f00000001c0)=@nfc_llcp, &(0x7f0000000080)=0x80) r5 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r5, 0x10c, 0x3, &(0x7f0000000000), 0x4) connect$llc(r5, &(0x7f0000000040)={0x1a, 0x337, 0x4b, 0x4, 0x3, 0x7f, @local}, 0x10) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) write$cgroup_int(r2, &(0x7f0000000080), 0xffffff19) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000500)={{&(0x7f0000000240)}, &(0x7f00000004c0), 0x4}, 0x20) ioctl$sock_x25_SIOCDELRT(r2, 0x890c, &(0x7f00000003c0)={@null=' \x00', 0xa, 'bcsf0\x00'}) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000540)=ANY=[@ANYBLOB="ff000002000000000000000000000000699c57382b7245e35b34ab45f90c1b05abb3c4b5ad359d2a45a8056bd69fa1c91e82fb253dd323bc6df8f8b461d1514136aaf25ffc85493d833096ce29887ca869cd405bf96b83ccfc1f0000b03697f3d1cb99f304d3bdb85d5e18266b17266b0a3c9a2a79ed4dc8bed81a5e9c89894d960275089673217e286c7c8bf32a000000000000000000000000"]) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f00000007c0)={'syzkaller0\x00', 0x2}) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000100), 0x10) ioctl(r6, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000040)) [ 870.672217][T12840] llc_conn_state_process: llc_conn_service failed [ 871.472965][T12844] llc_conn_state_process: llc_conn_service failed 01:41:48 executing program 0: syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, 'Nh8', 0x18, 0x4, 0x0, @remote, @local, {[], @tipc=@payload_conn={{{0x18, 0x0, 0x0, 0x0, 0x0, 0x6}}}}}}}}, 0x0) 01:41:48 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000200)={0x0, 0xfffffffffffbff48}, 0x8) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x77, &(0x7f0000000100), 0x8) 01:41:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000000)=0x20, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x4000, 0x4) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)="480000001400190d09004beafd0d8c562c84ed7a80ffe0060f000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00000000000000", 0x48}], 0x1) [ 871.847166][T12811] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 01:41:48 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002200815fe45ac187185095cf0600b0eba0b4d65cdbaa98cbb30007fff00000000000000051894d5d1dac", 0x2e}], 0x1}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000000000000000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f000000b800)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 01:41:48 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x33, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0xdbd, 0x9, 0xf74a, 0xfffffff800000000}}, &(0x7f00000002c0)=0xb0) ioctl$FICLONE(r3, 0x40049409, r3) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000001980)={0x8001, 0x100000001, 0x0, 0x803}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000280)={'bcsf0\x00', {0x2, 0x4e22, @multicast1}}) r4 = socket$rds(0x15, 0x5, 0x0) bind$alg(r3, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) getpeername(r3, &(0x7f00000001c0)=@nfc_llcp, &(0x7f0000000080)=0x80) r5 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r5, 0x10c, 0x3, &(0x7f0000000000), 0x4) connect$llc(r5, &(0x7f0000000040)={0x1a, 0x337, 0x4b, 0x4, 0x3, 0x7f, @local}, 0x10) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) write$cgroup_int(r2, &(0x7f0000000080), 0xffffff19) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000500)={{&(0x7f0000000240)}, &(0x7f00000004c0), 0x4}, 0x20) ioctl$sock_x25_SIOCDELRT(r2, 0x890c, &(0x7f00000003c0)={@null=' \x00', 0xa, 'bcsf0\x00'}) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000540)=ANY=[@ANYBLOB="ff000002000000000000000000000000699c57382b7245e35b34ab45f90c1b05abb3c4b5ad359d2a45a8056bd69fa1c91e82fb253dd323bc6df8f8b461d1514136aaf25ffc85493d833096ce29887ca869cd405bf96b83ccfc1f0000b03697f3d1cb99f304d3bdb85d5e18266b17266b0a3c9a2a79ed4dc8bed81a5e9c89894d960275089673217e286c7c8bf32a000000000000000000000000"]) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f00000007c0)={'syzkaller0\x00', 0x2}) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000100), 0x10) ioctl(r6, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 01:41:48 executing program 0: syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, 'Nh8', 0x18, 0x4, 0x0, @remote, @local, {[], @tipc=@payload_conn={{{0x18, 0x0, 0x0, 0x0, 0x0, 0x6}}}}}}}}, 0x0) 01:41:48 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x33, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0xdbd, 0x9, 0xf74a, 0xfffffff800000000}}, &(0x7f00000002c0)=0xb0) ioctl$FICLONE(r3, 0x40049409, r3) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000001980)={0x8001, 0x100000001, 0x0, 0x803}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000280)={'bcsf0\x00', {0x2, 0x4e22, @multicast1}}) r4 = socket$rds(0x15, 0x5, 0x0) bind$alg(r3, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) getpeername(r3, &(0x7f00000001c0)=@nfc_llcp, &(0x7f0000000080)=0x80) r5 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r5, 0x10c, 0x3, &(0x7f0000000000), 0x4) connect$llc(r5, &(0x7f0000000040)={0x1a, 0x337, 0x4b, 0x4, 0x3, 0x7f, @local}, 0x10) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) write$cgroup_int(r2, &(0x7f0000000080), 0xffffff19) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000500)={{&(0x7f0000000240)}, &(0x7f00000004c0), 0x4}, 0x20) ioctl$sock_x25_SIOCDELRT(r2, 0x890c, &(0x7f00000003c0)={@null=' \x00', 0xa, 'bcsf0\x00'}) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000540)=ANY=[@ANYBLOB="ff000002000000000000000000000000699c57382b7245e35b34ab45f90c1b05abb3c4b5ad359d2a45a8056bd69fa1c91e82fb253dd323bc6df8f8b461d1514136aaf25ffc85493d833096ce29887ca869cd405bf96b83ccfc1f0000b03697f3d1cb99f304d3bdb85d5e18266b17266b0a3c9a2a79ed4dc8bed81a5e9c89894d960275089673217e286c7c8bf32a000000000000000000000000"]) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f00000007c0)={'syzkaller0\x00', 0x2}) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000100), 0x10) ioctl(r6, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000040)) [ 872.066081][T12862] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 01:41:48 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000100), 0x4) 01:41:48 executing program 0: syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, 'Nh8', 0x18, 0x4, 0x0, @remote, @local, {[], @tipc=@payload_conn={{{0x18, 0x0, 0x0, 0x0, 0x0, 0x6}}}}}}}}, 0x0) [ 872.229119][T12865] llc_conn_state_process: llc_conn_service failed 01:41:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}, 0x800, 0x0, 0xff, 0x0, 0x0, 0xfffffffffffffffd}, 0x20) 01:41:48 executing program 0: syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, 'Nh8', 0x18, 0x4, 0x0, @remote, @local, {[], @tipc=@payload_conn={{{0x18, 0x0, 0x0, 0x0, 0x0, 0x6}}}}}}}}, 0x0) 01:41:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000000)=0x1c, 0x4) [ 872.520302][T12883] llc_conn_state_process: llc_conn_service failed 01:41:48 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1300, &(0x7f0000000000), &(0x7f0000000080)=0x60) 01:41:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f0000002b00)='syzkall\xc1\x9c\x85\x9dz\xca0\f\xb7\"\x83!%\xf4er\x00', 0x1, 0xb7, &(0x7f00000028c0)=""/183}, 0x7f) r2 = socket$kcm(0x29, 0x2000000000000005, 0x0) recvmmsg(r2, &(0x7f0000000300)=[{{&(0x7f0000000100)=@hci, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1}}], 0x400000000000300, 0x0, 0x0) recvmmsg(r2, &(0x7f0000006980)=[{{0x0, 0x0, 0x0}}], 0x600, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r0, r1}) write$binfmt_elf32(r2, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0], 0x4) 01:41:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40fa8c8aa024d00000000ffffffff25fe48261e21ccf67e1d7b5510029663000000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) listen(r1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x5) 01:41:49 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0xc100) write(r0, &(0x7f00000033c0)="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", 0x58f) [ 872.850902][T12902] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 01:41:49 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x33, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0xdbd, 0x9, 0xf74a, 0xfffffff800000000}}, &(0x7f00000002c0)=0xb0) ioctl$FICLONE(r3, 0x40049409, r3) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000001980)={0x8001, 0x100000001, 0x0, 0x803}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000280)={'bcsf0\x00', {0x2, 0x4e22, @multicast1}}) r4 = socket$rds(0x15, 0x5, 0x0) bind$alg(r3, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) getpeername(r3, &(0x7f00000001c0)=@nfc_llcp, &(0x7f0000000080)=0x80) r5 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r5, 0x10c, 0x3, &(0x7f0000000000), 0x4) connect$llc(r5, &(0x7f0000000040)={0x1a, 0x337, 0x4b, 0x4, 0x3, 0x7f, @local}, 0x10) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) write$cgroup_int(r2, &(0x7f0000000080), 0xffffff19) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000500)={{&(0x7f0000000240)}, &(0x7f00000004c0), 0x4}, 0x20) ioctl$sock_x25_SIOCDELRT(r2, 0x890c, &(0x7f00000003c0)={@null=' \x00', 0xa, 'bcsf0\x00'}) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000540)=ANY=[@ANYBLOB="ff000002000000000000000000000000699c57382b7245e35b34ab45f90c1b05abb3c4b5ad359d2a45a8056bd69fa1c91e82fb253dd323bc6df8f8b461d1514136aaf25ffc85493d833096ce29887ca869cd405bf96b83ccfc1f0000b03697f3d1cb99f304d3bdb85d5e18266b17266b0a3c9a2a79ed4dc8bed81a5e9c89894d960275089673217e286c7c8bf32a000000000000000000000000"]) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f00000007c0)={'syzkaller0\x00', 0x2}) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000100), 0x10) ioctl(r6, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 01:41:49 executing program 2: r0 = socket(0x10, 0x200000000002, 0x0) write(r0, &(0x7f0000000000)="1f0000004e00fd00010c00f60000ff008109f80009000180060107ec5cf98a", 0x1f) 01:41:49 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000280)={0x4201}, 0x4) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x3, 0x0, @ipv4}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f00000000c0)=[@in={0x2, 0x3, @local}], 0x10) recvfrom(r0, &(0x7f0000000000)=""/120, 0x78, 0x40000100, &(0x7f0000000200)=@can, 0x80) 01:41:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40fa8c8aa024d00000000ffffffff25fe48261e21ccf67e1d7b5510029663000000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) listen(r1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x5) 01:41:49 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x33, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0xdbd, 0x9, 0xf74a, 0xfffffff800000000}}, &(0x7f00000002c0)=0xb0) ioctl$FICLONE(r3, 0x40049409, r3) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000001980)={0x8001, 0x100000001, 0x0, 0x803}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000280)={'bcsf0\x00', {0x2, 0x4e22, @multicast1}}) r4 = socket$rds(0x15, 0x5, 0x0) bind$alg(r3, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) getpeername(r3, &(0x7f00000001c0)=@nfc_llcp, &(0x7f0000000080)=0x80) r5 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r5, 0x10c, 0x3, &(0x7f0000000000), 0x4) connect$llc(r5, &(0x7f0000000040)={0x1a, 0x337, 0x4b, 0x4, 0x3, 0x7f, @local}, 0x10) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) write$cgroup_int(r2, &(0x7f0000000080), 0xffffff19) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000500)={{&(0x7f0000000240)}, &(0x7f00000004c0), 0x4}, 0x20) ioctl$sock_x25_SIOCDELRT(r2, 0x890c, &(0x7f00000003c0)={@null=' \x00', 0xa, 'bcsf0\x00'}) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000540)=ANY=[@ANYBLOB="ff000002000000000000000000000000699c57382b7245e35b34ab45f90c1b05abb3c4b5ad359d2a45a8056bd69fa1c91e82fb253dd323bc6df8f8b461d1514136aaf25ffc85493d833096ce29887ca869cd405bf96b83ccfc1f0000b03697f3d1cb99f304d3bdb85d5e18266b17266b0a3c9a2a79ed4dc8bed81a5e9c89894d960275089673217e286c7c8bf32a000000000000000000000000"]) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f00000007c0)={'syzkaller0\x00', 0x2}) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000100), 0x10) ioctl(r6, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 01:41:49 executing program 2: syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 01:41:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40fa8c8aa024d00000000ffffffff25fe48261e21ccf67e1d7b5510029663000000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) listen(r1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x5) [ 873.664917][T12919] llc_conn_state_process: llc_conn_service failed 01:41:50 executing program 2: syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 01:41:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40fa8c8aa024d00000000ffffffff25fe48261e21ccf67e1d7b5510029663000000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) listen(r1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x5) [ 873.894394][T12932] llc_conn_state_process: llc_conn_service failed [ 873.909460][ C0] net_ratelimit: 10420 callbacks suppressed [ 873.909476][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 873.927777][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 873.930630][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 873.940037][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 873.952414][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 873.964080][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 01:41:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f0000002b00)='syzkall\xc1\x9c\x85\x9dz\xca0\f\xb7\"\x83!%\xf4er\x00', 0x1, 0xb7, &(0x7f00000028c0)=""/183}, 0x7f) r2 = socket$kcm(0x29, 0x2000000000000005, 0x0) recvmmsg(r2, &(0x7f0000000300)=[{{&(0x7f0000000100)=@hci, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1}}], 0x400000000000300, 0x0, 0x0) recvmmsg(r2, &(0x7f0000006980)=[{{0x0, 0x0, 0x0}}], 0x600, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r0, r1}) write$binfmt_elf32(r2, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0], 0x4) 01:41:50 executing program 2: syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 873.976533][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 873.988177][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 873.999883][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 874.011800][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 01:41:50 executing program 2: syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 01:41:50 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x33, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0xdbd, 0x9, 0xf74a, 0xfffffff800000000}}, &(0x7f00000002c0)=0xb0) ioctl$FICLONE(r3, 0x40049409, r3) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000001980)={0x8001, 0x100000001, 0x0, 0x803}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000280)={'bcsf0\x00', {0x2, 0x4e22, @multicast1}}) r4 = socket$rds(0x15, 0x5, 0x0) bind$alg(r3, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) getpeername(r3, &(0x7f00000001c0)=@nfc_llcp, &(0x7f0000000080)=0x80) r5 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r5, 0x10c, 0x3, &(0x7f0000000000), 0x4) connect$llc(r5, &(0x7f0000000040)={0x1a, 0x337, 0x4b, 0x4, 0x3, 0x7f, @local}, 0x10) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) write$cgroup_int(r2, &(0x7f0000000080), 0xffffff19) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000500)={{&(0x7f0000000240)}, &(0x7f00000004c0), 0x4}, 0x20) ioctl$sock_x25_SIOCDELRT(r2, 0x890c, &(0x7f00000003c0)={@null=' \x00', 0xa, 'bcsf0\x00'}) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000540)=ANY=[@ANYBLOB="ff000002000000000000000000000000699c57382b7245e35b34ab45f90c1b05abb3c4b5ad359d2a45a8056bd69fa1c91e82fb253dd323bc6df8f8b461d1514136aaf25ffc85493d833096ce29887ca869cd405bf96b83ccfc1f0000b03697f3d1cb99f304d3bdb85d5e18266b17266b0a3c9a2a79ed4dc8bed81a5e9c89894d960275089673217e286c7c8bf32a000000000000000000000000"]) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f00000007c0)={'syzkaller0\x00', 0x2}) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000100), 0x10) ioctl(r6, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 01:41:50 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f0000002b00)='syzkall\xc1\x9c\x85\x9dz\xca0\f\xb7\"\x83!%\xf4er\x00', 0x1, 0xb7, &(0x7f00000028c0)=""/183}, 0x7f) r2 = socket$kcm(0x29, 0x2000000000000005, 0x0) recvmmsg(r2, &(0x7f0000000300)=[{{&(0x7f0000000100)=@hci, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1}}], 0x400000000000300, 0x0, 0x0) recvmmsg(r2, &(0x7f0000006980)=[{{0x0, 0x0, 0x0}}], 0x600, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r0, r1}) write$binfmt_elf32(r2, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0], 0x4) 01:41:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f0000002b00)='syzkall\xc1\x9c\x85\x9dz\xca0\f\xb7\"\x83!%\xf4er\x00', 0x1, 0xb7, &(0x7f00000028c0)=""/183}, 0x7f) r2 = socket$kcm(0x29, 0x2000000000000005, 0x0) recvmmsg(r2, &(0x7f0000000300)=[{{&(0x7f0000000100)=@hci, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1}}], 0x400000000000300, 0x0, 0x0) recvmmsg(r2, &(0x7f0000006980)=[{{0x0, 0x0, 0x0}}], 0x600, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r0, r1}) write$binfmt_elf32(r2, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0], 0x4) 01:41:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x70}]}, &(0x7f00000000c0)='GPL\x00', 0x1, 0xfb, &(0x7f0000000680)=""/251}, 0x48) 01:41:50 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = accept4$nfc_llcp(r0, &(0x7f00000002c0), &(0x7f0000000380)=0x60, 0x952bf20cc5099e46) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x4000, 0xfffffffffffffffc, 0x8, 0x9, 0x0, 0x33, {0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x0, 0xdbd, 0x9, 0xf74a, 0xfffffff800000000}}, &(0x7f00000002c0)=0xb0) ioctl$FICLONE(r3, 0x40049409, r3) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000001980)={0x8001, 0x100000001, 0x0, 0x803}, 0x10) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000280)={'bcsf0\x00', {0x2, 0x4e22, @multicast1}}) r4 = socket$rds(0x15, 0x5, 0x0) bind$alg(r3, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) getpeername(r3, &(0x7f00000001c0)=@nfc_llcp, &(0x7f0000000080)=0x80) r5 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r5, 0x10c, 0x3, &(0x7f0000000000), 0x4) connect$llc(r5, &(0x7f0000000040)={0x1a, 0x337, 0x4b, 0x4, 0x3, 0x7f, @local}, 0x10) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) write$cgroup_int(r2, &(0x7f0000000080), 0xffffff19) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000500)={{&(0x7f0000000240)}, &(0x7f00000004c0), 0x4}, 0x20) ioctl$sock_x25_SIOCDELRT(r2, 0x890c, &(0x7f00000003c0)={@null=' \x00', 0xa, 'bcsf0\x00'}) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000540)=ANY=[@ANYBLOB="ff000002000000000000000000000000699c57382b7245e35b34ab45f90c1b05abb3c4b5ad359d2a45a8056bd69fa1c91e82fb253dd323bc6df8f8b461d1514136aaf25ffc85493d833096ce29887ca869cd405bf96b83ccfc1f0000b03697f3d1cb99f304d3bdb85d5e18266b17266b0a3c9a2a79ed4dc8bed81a5e9c89894d960275089673217e286c7c8bf32a000000000000000000000000"]) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f00000007c0)={'syzkaller0\x00', 0x2}) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000100), 0x10) ioctl(r6, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000040)) [ 874.745563][T12965] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 01:41:51 executing program 2: unshare(0x4000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x4, 0x4, 0x9}, 0x2c) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r0, 0xffffffffffffffff, 0x7}, 0x10) [ 874.842556][T12964] llc_conn_state_process: llc_conn_service failed 01:41:51 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x21, &(0x7f0000000180)={'nat\x00', 0x0, 0x0, 0x0, [], 0x0, &(0x7f0000000080)}, 0x78) 01:41:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f0000002b00)='syzkall\xc1\x9c\x85\x9dz\xca0\f\xb7\"\x83!%\xf4er\x00', 0x1, 0xb7, &(0x7f00000028c0)=""/183}, 0x7f) r2 = socket$kcm(0x29, 0x2000000000000005, 0x0) recvmmsg(r2, &(0x7f0000000300)=[{{&(0x7f0000000100)=@hci, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1}}], 0x400000000000300, 0x0, 0x0) recvmmsg(r2, &(0x7f0000006980)=[{{0x0, 0x0, 0x0}}], 0x600, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r0, r1}) write$binfmt_elf32(r2, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0], 0x4) 01:41:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f0000002b00)='syzkall\xc1\x9c\x85\x9dz\xca0\f\xb7\"\x83!%\xf4er\x00', 0x1, 0xb7, &(0x7f00000028c0)=""/183}, 0x7f) r2 = socket$kcm(0x29, 0x2000000000000005, 0x0) recvmmsg(r2, &(0x7f0000000300)=[{{&(0x7f0000000100)=@hci, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1}}], 0x400000000000300, 0x0, 0x0) recvmmsg(r2, &(0x7f0000006980)=[{{0x0, 0x0, 0x0}}], 0x600, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r0, r1}) write$binfmt_elf32(r2, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0], 0x4) 01:41:51 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="5500000018007f0312fe01b2a4a280930a06000000a84306910000000b000f0035020000060000001900154002000001d40000dc1338d54400009b84136ef75afb83de44110016000d0002000000060cec4faba7d4", 0x55}], 0x1}, 0x0) 01:41:51 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f0000002b00)='syzkall\xc1\x9c\x85\x9dz\xca0\f\xb7\"\x83!%\xf4er\x00', 0x1, 0xb7, &(0x7f00000028c0)=""/183}, 0x7f) r2 = socket$kcm(0x29, 0x2000000000000005, 0x0) recvmmsg(r2, &(0x7f0000000300)=[{{&(0x7f0000000100)=@hci, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1}}], 0x400000000000300, 0x0, 0x0) recvmmsg(r2, &(0x7f0000006980)=[{{0x0, 0x0, 0x0}}], 0x600, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r0, r1}) write$binfmt_elf32(r2, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0], 0x4) [ 875.171789][T12979] llc_conn_state_process: llc_conn_service failed 01:41:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f0000002b00)='syzkall\xc1\x9c\x85\x9dz\xca0\f\xb7\"\x83!%\xf4er\x00', 0x1, 0xb7, &(0x7f00000028c0)=""/183}, 0x7f) r2 = socket$kcm(0x29, 0x2000000000000005, 0x0) recvmmsg(r2, &(0x7f0000000300)=[{{&(0x7f0000000100)=@hci, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1}}], 0x400000000000300, 0x0, 0x0) recvmmsg(r2, &(0x7f0000006980)=[{{0x0, 0x0, 0x0}}], 0x600, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r0, r1}) write$binfmt_elf32(r2, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0], 0x4) [ 875.375286][T12999] netlink: 'syz-executor.2': attribute type 15 has an invalid length. [ 875.402732][T12999] netlink: 'syz-executor.2': attribute type 21 has an invalid length. [ 875.432777][T12999] IPv6: NLM_F_CREATE should be specified when creating new route [ 875.477433][T12999] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 875.529427][T12999] IPv6: Can't replace route, no match found 01:41:52 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0x0, 0x0, 0x0) 01:41:52 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="5500000018007f0312fe01b2a4a280930a06000000a84306910000000b000f0035020000060000001900154002000001d40000dc1338d54400009b84136ef75afb83de44110016000d0002000000060cec4faba7d4", 0x55}], 0x1}, 0x0) 01:41:52 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f0000002b00)='syzkall\xc1\x9c\x85\x9dz\xca0\f\xb7\"\x83!%\xf4er\x00', 0x1, 0xb7, &(0x7f00000028c0)=""/183}, 0x7f) r2 = socket$kcm(0x29, 0x2000000000000005, 0x0) recvmmsg(r2, &(0x7f0000000300)=[{{&(0x7f0000000100)=@hci, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1}}], 0x400000000000300, 0x0, 0x0) recvmmsg(r2, &(0x7f0000006980)=[{{0x0, 0x0, 0x0}}], 0x600, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r0, r1}) write$binfmt_elf32(r2, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0], 0x4) 01:41:52 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x101) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000540)={0x0, 0x0, 0x10}, 0xc) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) write(r1, &(0x7f0000000100), 0x34000) 01:41:52 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1}, 0xcc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000240), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f00000002c0), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000180)}, 0x10) 01:41:52 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x54}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, 0x48) [ 876.100333][T13019] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 01:41:52 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f0000002b00)='syzkall\xc1\x9c\x85\x9dz\xca0\f\xb7\"\x83!%\xf4er\x00', 0x1, 0xb7, &(0x7f00000028c0)=""/183}, 0x7f) r2 = socket$kcm(0x29, 0x2000000000000005, 0x0) recvmmsg(r2, &(0x7f0000000300)=[{{&(0x7f0000000100)=@hci, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1}}], 0x400000000000300, 0x0, 0x0) recvmmsg(r2, &(0x7f0000006980)=[{{0x0, 0x0, 0x0}}], 0x600, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r0, r1}) write$binfmt_elf32(r2, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0], 0x4) [ 876.195105][T13019] netlink: 'syz-executor.2': attribute type 21 has an invalid length. 01:41:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f3188b070") socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000000)={'bond0\x00', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r2, 0x89f0, &(0x7f0000000000)={'bond0\x00\x00\x00?G\xd0\x06\x00\x04\x00', @ifru_names='bond_slave_1\x00\x00\x03/'}) 01:41:52 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x54}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, 0x48) [ 876.328983][T13019] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 01:41:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000001f000)={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(sha3-224-generic,cbc-camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x2) [ 876.400294][T13019] IPv6: Can't replace route, no match found [ 876.481874][T13044] bond0: Releasing backup interface bond_slave_1 01:41:52 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x54}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, 0x48) 01:41:52 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="5500000018007f0312fe01b2a4a280930a06000000a84306910000000b000f0035020000060000001900154002000001d40000dc1338d54400009b84136ef75afb83de44110016000d0002000000060cec4faba7d4", 0x55}], 0x1}, 0x0) 01:41:52 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x54}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, 0x48) 01:41:52 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000440), 0x10) recvmmsg(r0, &(0x7f0000002cc0), 0x2, 0x0, 0x0) sendmsg$can_bcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x5, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "3ce93489ca47e9a5"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x7, 0x0, 0x0, {0x77359400}, {0x77359400}, {}, 0x8, @can={{}, 0x0, 0x0, 0x0, 0x0, "c4d981ae211e6951"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x7, 0x0, 0x0, {0x0, 0x7530}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "3cfbb57069def852"}}, 0x48}}, 0x0) 01:41:53 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[@ANYBLOB="0212000002000000db00000000000000"], 0x10}}, 0x0) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 01:41:53 executing program 1: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000020607031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 877.085340][T13073] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 01:41:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40fa8c8aa024d00000000ffffffff25fe48261e21ccf67e1d7b5510029663000000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 01:41:53 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, 0x0) 01:41:53 executing program 3: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000320007031dfffd946fa2830020200a0009000200001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 877.311987][T13081] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -107 0 [ 877.893226][T13038] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 877.934047][T13059] netlink: 'syz-executor.2': attribute type 15 has an invalid length. [ 877.952066][T13059] netlink: 'syz-executor.2': attribute type 21 has an invalid length. [ 877.973699][T13059] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 878.002556][T13059] IPv6: Can't replace route, no match found [ 878.037355][T13075] bond0: Releasing backup interface bond_slave_1 [ 878.078849][T13090] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -107 0 [ 878.919352][ C0] net_ratelimit: 10929 callbacks suppressed [ 878.919369][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 878.920527][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 878.926005][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 878.939758][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 878.977014][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 878.991113][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 878.999327][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 879.004393][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 879.016775][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 879.028776][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) 01:41:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x2c, 0x4) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x0, 0x0, @ipv4}, 0x1c) setsockopt$sock_void(r1, 0x1, 0x19, 0x0, 0x0) 01:41:55 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="5500000018007f0312fe01b2a4a280930a06000000a84306910000000b000f0035020000060000001900154002000001d40000dc1338d54400009b84136ef75afb83de44110016000d0002000000060cec4faba7d4", 0x55}], 0x1}, 0x0) [ 879.072584][T13076] bond0: Enslaving bond_slave_1 as an active interface with an up link 01:41:55 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r0, 0x104, 0x3, &(0x7f0000000080)=0x7, 0x4) [ 879.135289][T13094] IPv6: Can't replace route, no match found 01:41:55 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000e00)={&(0x7f0000000380)=@abs, 0x6e, &(0x7f0000000800), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES64, @ANYRES32], 0x1c}, 0x0) 01:41:55 executing program 2: r0 = socket$inet(0x2, 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000080), &(0x7f0000000280)=0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000140)=[@in6={0xa, 0x0, 0x0, @rand_addr="176ba31bde74aeb62007400a9c158e8d"}], 0x1c) listen(r1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r4, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) socketpair(0x0, 0x0, 0x0, 0x0) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='vegas\x00', 0x2e7) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000000)='htcp\x00', 0x5) accept4$inet6(r4, &(0x7f00000002c0)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, &(0x7f0000000300)=0x1c, 0x80800) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) shutdown(r4, 0x1) r5 = accept4(r1, 0x0, 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f0000000100)={0xffffffff00000001, {{0x2, 0x4e23, @rand_addr=0x100000001}}, {{0x2, 0x4e22, @empty}}}, 0x108) bind$inet(r6, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) 01:41:55 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") write(r0, &(0x7f00000008c0)="33190401fe37f3c38915a97b9f89a1e5d197746e399eb35a0ad1627c9870b9f91b3878523e6238401579a755187b93058058be44e8bab37b665697f253670bdca6a28eeb22e9ee4ae4bd6df40370284be397c52ed6a5cef2e8f1e0ea6ffbdd75a82d87b3bad6c54130c4bd86b69af2b04cae7a1584ed5bf074c4961eb7ba3e7e5d6da3c47deac8b5a1dbc78bbef8314864834afe124dcbc034b138b09612f8d6a57f898aeae51b04ec9e2427c949d2e0ee152504e7fa15ef1b1d8ed4c535673112f48bced19a83e35fee6b5c8abda087", 0xd0) [ 882.198950][ T286] device bridge_slave_1 left promiscuous mode [ 882.205239][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 883.532513][ T286] device bridge_slave_0 left promiscuous mode [ 883.538786][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 883.929013][ C1] net_ratelimit: 19738 callbacks suppressed [ 883.929029][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 883.929051][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 883.936463][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 883.949588][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 883.961054][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 883.973863][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 883.985744][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 883.997923][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 884.009430][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 884.031735][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 886.304667][ T286] device hsr_slave_1 left promiscuous mode [ 888.562284][ T286] device hsr_slave_0 left promiscuous mode [ 888.655020][ T286] team0 (unregistering): Port device team_slave_1 removed [ 888.693756][ T286] team0 (unregistering): Port device team_slave_0 removed [ 888.714443][ T286] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 888.793906][ T286] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 888.938932][ C0] net_ratelimit: 21281 callbacks suppressed [ 888.938946][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 888.939462][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 888.945370][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 888.958398][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 888.970002][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 888.982451][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 888.993950][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 889.007852][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 889.020232][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 889.032130][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 889.177406][ T286] bond0 (unregistering): Released all slaves [ 893.949042][ C0] net_ratelimit: 20155 callbacks suppressed [ 893.949065][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 893.949131][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 893.955925][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 893.968917][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 893.981195][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 893.993399][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 894.005668][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 894.019034][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 894.031086][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 894.043030][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 898.958847][ C0] net_ratelimit: 21573 callbacks suppressed [ 898.958860][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 898.978347][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 898.978620][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 898.991011][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 899.003408][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 899.015430][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 899.029231][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 899.040745][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 899.052904][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 899.065008][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) 01:42:15 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x2) 01:42:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0xd, &(0x7f0000bfcffc), &(0x7f0000000100)=0x4) 01:42:15 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000200)={'veth0_to_team\x00', &(0x7f0000000080)=@ethtool_rxfh_indir={0x39}}) 01:42:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-avx2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b93c564b86c1490d5f9ef9ec63ff2d38eaac9457589d566a510a0008004ecf6d", 0x20) 01:42:15 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[@ANYBLOB="0212000002000000db00000000000000"], 0x10}}, 0x0) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 01:42:15 executing program 2: r0 = socket$inet(0x2, 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000080), &(0x7f0000000280)=0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000140)=[@in6={0xa, 0x0, 0x0, @rand_addr="176ba31bde74aeb62007400a9c158e8d"}], 0x1c) listen(r1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r4, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) socketpair(0x0, 0x0, 0x0, 0x0) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='vegas\x00', 0x2e7) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000000)='htcp\x00', 0x5) accept4$inet6(r4, &(0x7f00000002c0)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, &(0x7f0000000300)=0x1c, 0x80800) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) shutdown(r4, 0x1) r5 = accept4(r1, 0x0, 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f0000000100)={0xffffffff00000001, {{0x2, 0x4e23, @rand_addr=0x100000001}}, {{0x2, 0x4e22, @empty}}}, 0x108) bind$inet(r6, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) 01:42:15 executing program 1: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="24000000010907031dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 01:42:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") unshare(0x2000400) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000000)="24b1395acc29999c2949f265cb4318d4", 0x10) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, &(0x7f0000000240)=""/231, &(0x7f0000000340)=0xe7) 01:42:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x3801, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}}, 0x0) 01:42:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x330) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x7d) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0x801c581f, &(0x7f0000000080)) 01:42:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x3801, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}}, 0x0) 01:42:15 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x542, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 01:42:15 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000040)="f3f80003", 0x4) bind$can_raw(r0, &(0x7f00000000c0), 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000440)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000100)={0x1d, r1}, 0x10) 01:42:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x3801, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}}, 0x0) 01:42:16 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000040)="f3f80003", 0x4) bind$can_raw(r0, &(0x7f00000000c0), 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000440)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000100)={0x1d, r1}, 0x10) 01:42:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x330) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x7d) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0x801c581f, &(0x7f0000000080)) [ 903.969171][ C1] net_ratelimit: 19376 callbacks suppressed [ 903.969188][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 903.970494][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 903.975701][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 903.989390][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 904.004776][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 904.018201][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 904.029656][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 904.042034][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 904.053482][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 904.065965][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 01:42:20 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[@ANYBLOB="0212000002000000db00000000000000"], 0x10}}, 0x0) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 01:42:20 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x3801, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}}, 0x0) 01:42:20 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000040)="f3f80003", 0x4) bind$can_raw(r0, &(0x7f00000000c0), 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000440)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000100)={0x1d, r1}, 0x10) 01:42:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x330) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x7d) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0x801c581f, &(0x7f0000000080)) 01:42:20 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000040)="f3f80003", 0x4) bind$can_raw(r0, &(0x7f00000000c0), 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000440)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000100)={0x1d, r1}, 0x10) 01:42:20 executing program 2: r0 = socket$inet(0x2, 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000080), &(0x7f0000000280)=0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000140)=[@in6={0xa, 0x0, 0x0, @rand_addr="176ba31bde74aeb62007400a9c158e8d"}], 0x1c) listen(r1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r4, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) socketpair(0x0, 0x0, 0x0, 0x0) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='vegas\x00', 0x2e7) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000000)='htcp\x00', 0x5) accept4$inet6(r4, &(0x7f00000002c0)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, &(0x7f0000000300)=0x1c, 0x80800) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) shutdown(r4, 0x1) r5 = accept4(r1, 0x0, 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f0000000100)={0xffffffff00000001, {{0x2, 0x4e23, @rand_addr=0x100000001}}, {{0x2, 0x4e22, @empty}}}, 0x108) bind$inet(r6, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) 01:42:21 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000040)="f3f80003", 0x4) bind$can_raw(r0, &(0x7f00000000c0), 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000440)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000100)={0x1d, r1}, 0x10) 01:42:21 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000040)="f3f80003", 0x4) bind$can_raw(r0, &(0x7f00000000c0), 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000440)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000100)={0x1d, r1}, 0x10) 01:42:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x330) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x7d) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0x801c581f, &(0x7f0000000080)) 01:42:21 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) ioctl(r1, 0x0, &(0x7f0000000b80)="025cc83d6d346a8f762070d2b3c62ef144266f70f5582d75e957fc381115feaee2fd9f8f7ece7c12fc5f22077dea8deabe1dd88cbb5e26a7a1f94ed6ddea373026b65b13d9aedcc0f7ce70dd812c9cd81fd2fa66cd9c2833adb5cbdd9d83315274db820272073540224ae0605092bf419f78d37677910b82debcf6047716e406eaa748edaa58a8934f78f2dea27d8f90b33ae4f521c6d466a3832ae8e31d08f4e4dcc50c609604bcf4c85b9dda9de08d8cb55dbb8d68a75d4bc9c5569ce9dc57146b7ca2828d270bf6f7b28a7a8ba1") r2 = socket$pptp(0x18, 0x1, 0x2) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000180)=0xe1) unshare(0x60000000) r3 = socket$alg(0x26, 0x5, 0x0) sendfile(r2, r2, &(0x7f0000000340), 0x1f) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='GPLproc,{\x00', 0xffffffffffffff9c}, 0x10) getpeername$packet(r4, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) syz_genetlink_get_family_id$nbd(&(0x7f0000000500)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r3, &(0x7f0000000640)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1000010}, 0xc, &(0x7f0000000600)={&(0x7f0000001580)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x80) accept$alg(r3, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='pids.events\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f0000000280)={0x40, 0x8, 0x1, 0x1, 0x0}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000880)={r6, 0x6}, &(0x7f00000008c0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f0000000900)=@assoc_value={0x0, 0x8}, &(0x7f0000000940)=0x8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'s\xf9zk\x04Cled9\x1f\x8e\xac\xf1\x97\x8d', @ifru_map}) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl(r8, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$nl_generic(r7, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0xfffffff0}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x28, 0xb01, 0x0, 0x0, {0x10}}, 0x165}}, 0x0) ioctl(r0, 0xffffffff80000001, &(0x7f00000000c0)="68962351a410e118d85d1757749e1675edd95da2356b2e1b6c3ef1953759117f2515236846cea0e2ce25c6db17095f6ba300f564e2b7d9237d15238fac1defcbaee17606e11a7426bb433ed76b6a9674853a9bf33195f1c50b5ebfd0f45e5547210c1aab5db16c9fa4daedb68f150168c4e760b8ad717711f026b751eaa62d1a5d9bc1df4ba1f28352eac9086c7b1fda9ddaa1932979eb7f50a5eac973bc15feaa6a32346eefc13e37c07e09f3") r9 = socket$inet(0x2, 0x3, 0x2) accept4(r2, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000200)=0x80, 0x800) setsockopt$nfc_llcp_NFC_LLCP_RW(r10, 0x118, 0x0, &(0x7f0000000240)=0x22, 0x4) setsockopt$inet_int(r9, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) 01:42:21 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000040)="f3f80003", 0x4) bind$can_raw(r0, &(0x7f00000000c0), 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000440)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000100)={0x1d, r1}, 0x10) 01:42:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket(0x1e, 0x2, 0x0) bind(r1, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind(r1, 0x0, 0x0) [ 905.052897][T13223] IPVS: ftp: loaded support on port[0] = 21 [ 905.349691][T13231] IPVS: ftp: loaded support on port[0] = 21 01:42:21 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[@ANYBLOB="0212000002000000db00000000000000"], 0x10}}, 0x0) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 01:42:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0xc) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000080)="24000000020907061dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 01:42:21 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'bridge_slave_1\x00', {0x2, 0x4e20, @local}}) accept4(r0, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f00000000c0)=0x80, 0x800) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400088}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x100, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r4, 0x0, 0x2c, &(0x7f0000007ff4)={@loopback, @multicast1}, 0x108) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2c, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 01:42:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") pipe(&(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) listen(r3, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r4 = socket$unix(0x1, 0x801, 0x0) connect$unix(r4, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) splice(r1, 0x0, r4, 0x0, 0x8010005, 0x0) [ 905.610946][T13245] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.1'. 01:42:21 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000100), 0xffffffffffffffb1) 01:42:22 executing program 2: r0 = socket$inet(0x2, 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000080), &(0x7f0000000280)=0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000140)=[@in6={0xa, 0x0, 0x0, @rand_addr="176ba31bde74aeb62007400a9c158e8d"}], 0x1c) listen(r1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r4, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) socketpair(0x0, 0x0, 0x0, 0x0) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='vegas\x00', 0x2e7) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000000)='htcp\x00', 0x5) accept4$inet6(r4, &(0x7f00000002c0)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, &(0x7f0000000300)=0x1c, 0x80800) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) shutdown(r4, 0x1) r5 = accept4(r1, 0x0, 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f0000000100)={0xffffffff00000001, {{0x2, 0x4e23, @rand_addr=0x100000001}}, {{0x2, 0x4e22, @empty}}}, 0x108) bind$inet(r6, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) 01:42:22 executing program 1: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="240000001a0025f0006bb4f7fdff141c020b5aff6e10b500000780cc08001b0000800000", 0x24) [ 906.018686][T13262] validate_nla: 3 callbacks suppressed [ 906.018697][T13262] netlink: 'syz-executor.1': attribute type 27 has an invalid length. 01:42:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f00000001c0)="390000001000093317feb1ae7aa77cf40000f63f080000f045009db9120c007b05000300000168849ef72da102159affff55e91ee538d2fd00", 0x39}], 0x1) 01:42:22 executing program 1: r0 = socket$kcm(0x10, 0x4000000003, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="2e0000002b00672de45ae087185082cf0124b0eba06ec4410b80ffff000000020000000000008d0051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 906.195383][T13270] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.4'. 01:42:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x8) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000b82000)={0x10000004}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x80, 0x0) epoll_wait(r3, &(0x7f0000000000)=[{}], 0x1, 0x200) recvmmsg(r1, &(0x7f000030efc4)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:42:23 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$IMGETCOUNT(0xffffffffffffffff, 0x80044943, &(0x7f0000000040)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) socketpair(0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 01:42:23 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cgroup.max.descendants\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000001200)=ANY=[@ANYBLOB='-3'], 0x2) 01:42:23 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) ioctl(r1, 0x0, &(0x7f0000000b80)="025cc83d6d346a8f762070d2b3c62ef144266f70f5582d75e957fc381115feaee2fd9f8f7ece7c12fc5f22077dea8deabe1dd88cbb5e26a7a1f94ed6ddea373026b65b13d9aedcc0f7ce70dd812c9cd81fd2fa66cd9c2833adb5cbdd9d83315274db820272073540224ae0605092bf419f78d37677910b82debcf6047716e406eaa748edaa58a8934f78f2dea27d8f90b33ae4f521c6d466a3832ae8e31d08f4e4dcc50c609604bcf4c85b9dda9de08d8cb55dbb8d68a75d4bc9c5569ce9dc57146b7ca2828d270bf6f7b28a7a8ba1") r2 = socket$pptp(0x18, 0x1, 0x2) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000180)=0xe1) unshare(0x60000000) r3 = socket$alg(0x26, 0x5, 0x0) sendfile(r2, r2, &(0x7f0000000340), 0x1f) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='GPLproc,{\x00', 0xffffffffffffff9c}, 0x10) getpeername$packet(r4, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) syz_genetlink_get_family_id$nbd(&(0x7f0000000500)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r3, &(0x7f0000000640)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1000010}, 0xc, &(0x7f0000000600)={&(0x7f0000001580)=ANY=[@ANYBLOB="010025bd7000fedbdf25030000000c0005002c000000000000000c0004000300000000e9ff000c0003000000000000000000fdff08000000000000000000362d341ab57c0bdf628e000c000300010400367da33136ff005dc66ec4cc00000000020c0005000800000000000000f4ff010081000000000000000c000200d30000000000000000100000000000000000000000000000000000000000269d2d0000cd1a04f19b4ad9297ba3666dccb6a903630d52bdf6502c7184e0d67e6fa116161b805159ab7835e8a7abc3fcad52c6291e4c28dea80b730851edf02726a39c59434b3a0fc6e80efb55c93f85df4e1853297abd9a2601be7f07475533e773739fba4f45828dead92ab5a41dab0632384688e3bf1a74527e7901d3a4f24da5b0da8cedfbeddf713beff91aec108afd107bced8e5a42e3f9588c019a5347f3302358b92deaf5370e32c29edc742e420c27fffe21bd4ca4af2c0afa575942e6d25c1ae3b0da5db7d1716ba1ae68ce8cf8c382e45bd84fd822d9c83e21525448d"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x80) accept$alg(r3, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='pids.events\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f0000000280)={0x40, 0x8, 0x1, 0x1, 0x0}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000880)={r6, 0x6}, &(0x7f00000008c0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f0000000900)=@assoc_value={0x0, 0x8}, &(0x7f0000000940)=0x8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'s\xf9zk\x04Cled9\x1f\x8e\xac\xf1\x97\x8d', @ifru_map}) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl(r8, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$nl_generic(r7, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0xfffffff0}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x28, 0xb01, 0x0, 0x0, {0x10}}, 0x165}}, 0x0) ioctl(r0, 0xffffffff80000001, &(0x7f00000000c0)="68962351a410e118d85d1757749e1675edd95da2356b2e1b6c3ef1953759117f2515236846cea0e2ce25c6db17095f6ba300f564e2b7d9237d15238fac1defcbaee17606e11a7426bb433ed76b6a9674853a9bf33195f1c50b5ebfd0f45e5547210c1aab5db16c9fa4daedb68f150168c4e760b8ad717711f026b751eaa62d1a5d9bc1df4ba1f28352eac9086c7b1fda9ddaa1932979eb7f50a5eac973bc15feaa6a32346eefc13e37c07e09f3") r9 = socket$inet(0x2, 0x3, 0x2) accept4(r2, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000200)=0x80, 0x800) setsockopt$nfc_llcp_NFC_LLCP_RW(r10, 0x118, 0x0, &(0x7f0000000240)=0x22, 0x4) setsockopt$inet_int(r9, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) 01:42:23 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) ioctl(r1, 0x0, &(0x7f0000000b80)="025cc83d6d346a8f762070d2b3c62ef144266f70f5582d75e957fc381115feaee2fd9f8f7ece7c12fc5f22077dea8deabe1dd88cbb5e26a7a1f94ed6ddea373026b65b13d9aedcc0f7ce70dd812c9cd81fd2fa66cd9c2833adb5cbdd9d83315274db820272073540224ae0605092bf419f78d37677910b82debcf6047716e406eaa748edaa58a8934f78f2dea27d8f90b33ae4f521c6d466a3832ae8e31d08f4e4dcc50c609604bcf4c85b9dda9de08d8cb55dbb8d68a75d4bc9c5569ce9dc57146b7ca2828d270bf6f7b28a7a8ba1") r2 = socket$pptp(0x18, 0x1, 0x2) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000180)=0xe1) unshare(0x60000000) r3 = socket$alg(0x26, 0x5, 0x0) sendfile(r2, r2, &(0x7f0000000340), 0x1f) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='GPLproc,{\x00', 0xffffffffffffff9c}, 0x10) getpeername$packet(r4, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) syz_genetlink_get_family_id$nbd(&(0x7f0000000500)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r3, &(0x7f0000000640)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1000010}, 0xc, &(0x7f0000000600)={&(0x7f0000001580)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x80) accept$alg(r3, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='pids.events\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f0000000280)={0x40, 0x8, 0x1, 0x1, 0x0}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000880)={r6, 0x6}, &(0x7f00000008c0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f0000000900)=@assoc_value={0x0, 0x8}, &(0x7f0000000940)=0x8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'s\xf9zk\x04Cled9\x1f\x8e\xac\xf1\x97\x8d', @ifru_map}) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl(r8, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$nl_generic(r7, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0xfffffff0}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x28, 0xb01, 0x0, 0x0, {0x10}}, 0x165}}, 0x0) ioctl(r0, 0xffffffff80000001, &(0x7f00000000c0)="68962351a410e118d85d1757749e1675edd95da2356b2e1b6c3ef1953759117f2515236846cea0e2ce25c6db17095f6ba300f564e2b7d9237d15238fac1defcbaee17606e11a7426bb433ed76b6a9674853a9bf33195f1c50b5ebfd0f45e5547210c1aab5db16c9fa4daedb68f150168c4e760b8ad717711f026b751eaa62d1a5d9bc1df4ba1f28352eac9086c7b1fda9ddaa1932979eb7f50a5eac973bc15feaa6a32346eefc13e37c07e09f3") r9 = socket$inet(0x2, 0x3, 0x2) accept4(r2, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000200)=0x80, 0x800) setsockopt$nfc_llcp_NFC_LLCP_RW(r10, 0x118, 0x0, &(0x7f0000000240)=0x22, 0x4) setsockopt$inet_int(r9, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) [ 906.864115][T13291] IPVS: ftp: loaded support on port[0] = 21 [ 907.011162][T13300] IPVS: ftp: loaded support on port[0] = 21 01:42:23 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'bridge_slave_1\x00', {0x2, 0x4e20, @local}}) accept4(r0, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f00000000c0)=0x80, 0x800) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400088}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x100, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r4, 0x0, 0x2c, &(0x7f0000007ff4)={@loopback, @multicast1}, 0x108) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2c, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 01:42:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffffd4}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0x348, &(0x7f0000000480)=""/195, 0x0, 0x0, [0x42]}, 0x48) 01:42:23 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'bridge_slave_1\x00', {0x2, 0x4e20, @local}}) accept4(r0, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f00000000c0)=0x80, 0x800) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400088}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x100, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r4, 0x0, 0x2c, &(0x7f0000007ff4)={@loopback, @multicast1}, 0x108) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2c, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 01:42:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x8) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000b82000)={0x10000004}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x80, 0x0) epoll_wait(r3, &(0x7f0000000000)=[{}], 0x1, 0x200) recvmmsg(r1, &(0x7f000030efc4)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:42:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) bind$bt_sco(r1, &(0x7f0000000000), 0x8) listen(r1, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000001440), 0x4) 01:42:24 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x4, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000540], 0x0, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'ip_vti0\x00', 'veth1_to_hsr\x00', 'veth1\x00', 'veth0_to_team\x00', @random="67ad75d23239", [], @random="c929ccddfff7", [], 0x70, 0x70, 0xa0}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x19, 0x26, 0x9a00, 'ip6tnl0\x00', 'ip6erspan0\x00', 'hwsim0\x00', 'bridge_slave_0\x00', @dev={[], 0xe}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], @local, [0xff, 0xff, 0xff, 0x0, 0xff], 0xb0, 0x100, 0x150, [@devgroup={'devgroup\x00', 0x18, {{0xc, 0x9, 0x7fff, 0x8, 0x9}}}]}, [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x1, 'syz1\x00', 0xff}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x0, 0x100000000, 0x7fffffff}}}}]}]}, 0x2f8) 01:42:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000440)={{}, {}, 0x8, {0x2, 0x0, @local}, 'veth0_to_team\x00'}) 01:42:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="2e0000002e008183ad5de0713c444d00080000001000034000ff39a0053582c137153e37835b3f00040000000000", 0x2e}], 0x1}, 0x0) 01:42:24 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000019000000000002800000850000000000000095"], 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x17}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xc, &(0x7f0000000180)={r1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x28) 01:42:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x8) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000b82000)={0x10000004}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x80, 0x0) epoll_wait(r3, &(0x7f0000000000)=[{}], 0x1, 0x200) recvmmsg(r1, &(0x7f000030efc4)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 908.978908][ C1] net_ratelimit: 11254 callbacks suppressed [ 908.978924][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 908.981456][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 908.985771][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 908.997344][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 909.009393][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 909.021675][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 909.033247][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 909.045321][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 909.057954][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 909.069862][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 01:42:27 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) ioctl(r1, 0x0, &(0x7f0000000b80)="025cc83d6d346a8f762070d2b3c62ef144266f70f5582d75e957fc381115feaee2fd9f8f7ece7c12fc5f22077dea8deabe1dd88cbb5e26a7a1f94ed6ddea373026b65b13d9aedcc0f7ce70dd812c9cd81fd2fa66cd9c2833adb5cbdd9d83315274db820272073540224ae0605092bf419f78d37677910b82debcf6047716e406eaa748edaa58a8934f78f2dea27d8f90b33ae4f521c6d466a3832ae8e31d08f4e4dcc50c609604bcf4c85b9dda9de08d8cb55dbb8d68a75d4bc9c5569ce9dc57146b7ca2828d270bf6f7b28a7a8ba1") r2 = socket$pptp(0x18, 0x1, 0x2) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000180)=0xe1) unshare(0x60000000) r3 = socket$alg(0x26, 0x5, 0x0) sendfile(r2, r2, &(0x7f0000000340), 0x1f) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='GPLproc,{\x00', 0xffffffffffffff9c}, 0x10) getpeername$packet(r4, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) syz_genetlink_get_family_id$nbd(&(0x7f0000000500)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r3, &(0x7f0000000640)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1000010}, 0xc, &(0x7f0000000600)={&(0x7f0000001580)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x80) accept$alg(r3, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='pids.events\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f0000000280)={0x40, 0x8, 0x1, 0x1, 0x0}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000880)={r6, 0x6}, &(0x7f00000008c0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f0000000900)=@assoc_value={0x0, 0x8}, &(0x7f0000000940)=0x8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'s\xf9zk\x04Cled9\x1f\x8e\xac\xf1\x97\x8d', @ifru_map}) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl(r8, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$nl_generic(r7, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0xfffffff0}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x28, 0xb01, 0x0, 0x0, {0x10}}, 0x165}}, 0x0) ioctl(r0, 0xffffffff80000001, &(0x7f00000000c0)="68962351a410e118d85d1757749e1675edd95da2356b2e1b6c3ef1953759117f2515236846cea0e2ce25c6db17095f6ba300f564e2b7d9237d15238fac1defcbaee17606e11a7426bb433ed76b6a9674853a9bf33195f1c50b5ebfd0f45e5547210c1aab5db16c9fa4daedb68f150168c4e760b8ad717711f026b751eaa62d1a5d9bc1df4ba1f28352eac9086c7b1fda9ddaa1932979eb7f50a5eac973bc15feaa6a32346eefc13e37c07e09f3") r9 = socket$inet(0x2, 0x3, 0x2) accept4(r2, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000200)=0x80, 0x800) setsockopt$nfc_llcp_NFC_LLCP_RW(r10, 0x118, 0x0, &(0x7f0000000240)=0x22, 0x4) setsockopt$inet_int(r9, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) 01:42:27 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'bridge_slave_1\x00', {0x2, 0x4e20, @local}}) accept4(r0, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f00000000c0)=0x80, 0x800) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400088}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x100, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r4, 0x0, 0x2c, &(0x7f0000007ff4)={@loopback, @multicast1}, 0x108) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2c, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 01:42:27 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000019000000000002800000850000000000000095"], 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x17}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xc, &(0x7f0000000180)={r1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x28) 01:42:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x8) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000b82000)={0x10000004}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x80, 0x0) epoll_wait(r3, &(0x7f0000000000)=[{}], 0x1, 0x200) recvmmsg(r1, &(0x7f000030efc4)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:42:27 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'bridge_slave_1\x00', {0x2, 0x4e20, @local}}) accept4(r0, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f00000000c0)=0x80, 0x800) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400088}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x100, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r4, 0x0, 0x2c, &(0x7f0000007ff4)={@loopback, @multicast1}, 0x108) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2c, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 01:42:27 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) ioctl(r1, 0x0, &(0x7f0000000b80)="025cc83d6d346a8f762070d2b3c62ef144266f70f5582d75e957fc381115feaee2fd9f8f7ece7c12fc5f22077dea8deabe1dd88cbb5e26a7a1f94ed6ddea373026b65b13d9aedcc0f7ce70dd812c9cd81fd2fa66cd9c2833adb5cbdd9d83315274db820272073540224ae0605092bf419f78d37677910b82debcf6047716e406eaa748edaa58a8934f78f2dea27d8f90b33ae4f521c6d466a3832ae8e31d08f4e4dcc50c609604bcf4c85b9dda9de08d8cb55dbb8d68a75d4bc9c5569ce9dc57146b7ca2828d270bf6f7b28a7a8ba1") r2 = socket$pptp(0x18, 0x1, 0x2) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000180)=0xe1) unshare(0x60000000) r3 = socket$alg(0x26, 0x5, 0x0) sendfile(r2, r2, &(0x7f0000000340), 0x1f) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='GPLproc,{\x00', 0xffffffffffffff9c}, 0x10) getpeername$packet(r4, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) syz_genetlink_get_family_id$nbd(&(0x7f0000000500)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r3, &(0x7f0000000640)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1000010}, 0xc, &(0x7f0000000600)={&(0x7f0000001580)=ANY=[@ANYBLOB="010025bd7000fedbdf25030000000c0005002c000000000000000c0004000300000000e9ff000c0003000000000000000000fdff08000000000000000000362d341ab57c0bdf628e000c000300010400367da33136ff005dc66ec4cc00000000020c0005000800000000000000f4ff010081000000000000000c000200d30000000000000000100000000000000000000000000000000000000000269d2d0000cd1a04f19b4ad9297ba3666dccb6a903630d52bdf6502c7184e0d67e6fa116161b805159ab7835e8a7abc3fcad52c6291e4c28dea80b730851edf02726a39c59434b3a0fc6e80efb55c93f85df4e1853297abd9a2601be7f07475533e773739fba4f45828dead92ab5a41dab0632384688e3bf1a74527e7901d3a4f24da5b0da8cedfbeddf713beff91aec108afd107bced8e5a42e3f9588c019a5347f3302358b92deaf5370e32c29edc742e420c27fffe21bd4ca4af2c0afa575942e6d25c1ae3b0da5db7d1716ba1ae68ce8cf8c382e45bd84fd822d9c83e21525448d"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x80) accept$alg(r3, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='pids.events\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f0000000280)={0x40, 0x8, 0x1, 0x1, 0x0}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000880)={r6, 0x6}, &(0x7f00000008c0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f0000000900)=@assoc_value={0x0, 0x8}, &(0x7f0000000940)=0x8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'s\xf9zk\x04Cled9\x1f\x8e\xac\xf1\x97\x8d', @ifru_map}) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl(r8, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$nl_generic(r7, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0xfffffff0}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x28, 0xb01, 0x0, 0x0, {0x10}}, 0x165}}, 0x0) ioctl(r0, 0xffffffff80000001, &(0x7f00000000c0)="68962351a410e118d85d1757749e1675edd95da2356b2e1b6c3ef1953759117f2515236846cea0e2ce25c6db17095f6ba300f564e2b7d9237d15238fac1defcbaee17606e11a7426bb433ed76b6a9674853a9bf33195f1c50b5ebfd0f45e5547210c1aab5db16c9fa4daedb68f150168c4e760b8ad717711f026b751eaa62d1a5d9bc1df4ba1f28352eac9086c7b1fda9ddaa1932979eb7f50a5eac973bc15feaa6a32346eefc13e37c07e09f3") r9 = socket$inet(0x2, 0x3, 0x2) accept4(r2, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000200)=0x80, 0x800) setsockopt$nfc_llcp_NFC_LLCP_RW(r10, 0x118, 0x0, &(0x7f0000000240)=0x22, 0x4) setsockopt$inet_int(r9, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) 01:42:27 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000019000000000002800000850000000000000095"], 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x17}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xc, &(0x7f0000000180)={r1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x28) [ 911.431823][T13362] IPVS: ftp: loaded support on port[0] = 21 [ 911.440352][T13359] IPVS: ftp: loaded support on port[0] = 21 01:42:27 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000019000000000002800000850000000000000095"], 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x17}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xc, &(0x7f0000000180)={r1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x28) 01:42:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="d9a34fff", 0x4) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0xfffffdd5) recvmmsg(r2, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000400)=""/178, 0xb2}], 0x1}}, {{0x0, 0x0, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/214, 0xd6}], 0x1, 0x0, 0xfffffffffffffd6f}}], 0x2, 0x0, 0x0) 01:42:28 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) ioctl(r1, 0x0, &(0x7f0000000b80)="025cc83d6d346a8f762070d2b3c62ef144266f70f5582d75e957fc381115feaee2fd9f8f7ece7c12fc5f22077dea8deabe1dd88cbb5e26a7a1f94ed6ddea373026b65b13d9aedcc0f7ce70dd812c9cd81fd2fa66cd9c2833adb5cbdd9d83315274db820272073540224ae0605092bf419f78d37677910b82debcf6047716e406eaa748edaa58a8934f78f2dea27d8f90b33ae4f521c6d466a3832ae8e31d08f4e4dcc50c609604bcf4c85b9dda9de08d8cb55dbb8d68a75d4bc9c5569ce9dc57146b7ca2828d270bf6f7b28a7a8ba1") r2 = socket$pptp(0x18, 0x1, 0x2) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000180)=0xe1) unshare(0x60000000) r3 = socket$alg(0x26, 0x5, 0x0) sendfile(r2, r2, &(0x7f0000000340), 0x1f) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='GPLproc,{\x00', 0xffffffffffffff9c}, 0x10) getpeername$packet(r4, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) syz_genetlink_get_family_id$nbd(&(0x7f0000000500)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r3, &(0x7f0000000640)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1000010}, 0xc, &(0x7f0000000600)={&(0x7f0000001580)=ANY=[@ANYBLOB="010025bd7000fedbdf25030000000c0005002c000000000000000c0004000300000000e9ff000c0003000000000000000000fdff08000000000000000000362d341ab57c0bdf628e000c000300010400367da33136ff005dc66ec4cc00000000020c0005000800000000000000f4ff010081000000000000000c000200d30000000000000000100000000000000000000000000000000000000000269d2d0000cd1a04f19b4ad9297ba3666dccb6a903630d52bdf6502c7184e0d67e6fa116161b805159ab7835e8a7abc3fcad52c6291e4c28dea80b730851edf02726a39c59434b3a0fc6e80efb55c93f85df4e1853297abd9a2601be7f07475533e773739fba4f45828dead92ab5a41dab0632384688e3bf1a74527e7901d3a4f24da5b0da8cedfbeddf713beff91aec108afd107bced8e5a42e3f9588c019a5347f3302358b92deaf5370e32c29edc742e420c27fffe21bd4ca4af2c0afa575942e6d25c1ae3b0da5db7d1716ba1ae68ce8cf8c382e45bd84fd822d9c83e21525448d"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x80) accept$alg(r3, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='pids.events\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f0000000280)={0x40, 0x8, 0x1, 0x1, 0x0}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000880)={r6, 0x6}, &(0x7f00000008c0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f0000000900)=@assoc_value={0x0, 0x8}, &(0x7f0000000940)=0x8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'s\xf9zk\x04Cled9\x1f\x8e\xac\xf1\x97\x8d', @ifru_map}) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl(r8, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$nl_generic(r7, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0xfffffff0}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x28, 0xb01, 0x0, 0x0, {0x10}}, 0x165}}, 0x0) ioctl(r0, 0xffffffff80000001, &(0x7f00000000c0)="68962351a410e118d85d1757749e1675edd95da2356b2e1b6c3ef1953759117f2515236846cea0e2ce25c6db17095f6ba300f564e2b7d9237d15238fac1defcbaee17606e11a7426bb433ed76b6a9674853a9bf33195f1c50b5ebfd0f45e5547210c1aab5db16c9fa4daedb68f150168c4e760b8ad717711f026b751eaa62d1a5d9bc1df4ba1f28352eac9086c7b1fda9ddaa1932979eb7f50a5eac973bc15feaa6a32346eefc13e37c07e09f3") r9 = socket$inet(0x2, 0x3, 0x2) accept4(r2, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000200)=0x80, 0x800) setsockopt$nfc_llcp_NFC_LLCP_RW(r10, 0x118, 0x0, &(0x7f0000000240)=0x22, 0x4) setsockopt$inet_int(r9, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) 01:42:28 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) ioctl(r1, 0x0, &(0x7f0000000b80)="025cc83d6d346a8f762070d2b3c62ef144266f70f5582d75e957fc381115feaee2fd9f8f7ece7c12fc5f22077dea8deabe1dd88cbb5e26a7a1f94ed6ddea373026b65b13d9aedcc0f7ce70dd812c9cd81fd2fa66cd9c2833adb5cbdd9d83315274db820272073540224ae0605092bf419f78d37677910b82debcf6047716e406eaa748edaa58a8934f78f2dea27d8f90b33ae4f521c6d466a3832ae8e31d08f4e4dcc50c609604bcf4c85b9dda9de08d8cb55dbb8d68a75d4bc9c5569ce9dc57146b7ca2828d270bf6f7b28a7a8ba1") r2 = socket$pptp(0x18, 0x1, 0x2) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000180)=0xe1) unshare(0x60000000) r3 = socket$alg(0x26, 0x5, 0x0) sendfile(r2, r2, &(0x7f0000000340), 0x1f) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='GPLproc,{\x00', 0xffffffffffffff9c}, 0x10) getpeername$packet(r4, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) syz_genetlink_get_family_id$nbd(&(0x7f0000000500)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r3, &(0x7f0000000640)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1000010}, 0xc, &(0x7f0000000600)={&(0x7f0000001580)=ANY=[@ANYBLOB="010025bd7000fedbdf25030000000c0005002c000000000000000c0004000300000000e9ff000c0003000000000000000000fdff08000000000000000000362d341ab57c0bdf628e000c000300010400367da33136ff005dc66ec4cc00000000020c0005000800000000000000f4ff010081000000000000000c000200d30000000000000000100000000000000000000000000000000000000000269d2d0000cd1a04f19b4ad9297ba3666dccb6a903630d52bdf6502c7184e0d67e6fa116161b805159ab7835e8a7abc3fcad52c6291e4c28dea80b730851edf02726a39c59434b3a0fc6e80efb55c93f85df4e1853297abd9a2601be7f07475533e773739fba4f45828dead92ab5a41dab0632384688e3bf1a74527e7901d3a4f24da5b0da8cedfbeddf713beff91aec108afd107bced8e5a42e3f9588c019a5347f3302358b92deaf5370e32c29edc742e420c27fffe21bd4ca4af2c0afa575942e6d25c1ae3b0da5db7d1716ba1ae68ce8cf8c382e45bd84fd822d9c83e21525448d"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x80) accept$alg(r3, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='pids.events\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f0000000280)={0x40, 0x8, 0x1, 0x1, 0x0}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000880)={r6, 0x6}, &(0x7f00000008c0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f0000000900)=@assoc_value={0x0, 0x8}, &(0x7f0000000940)=0x8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'s\xf9zk\x04Cled9\x1f\x8e\xac\xf1\x97\x8d', @ifru_map}) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl(r8, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$nl_generic(r7, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0xfffffff0}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x28, 0xb01, 0x0, 0x0, {0x10}}, 0x165}}, 0x0) ioctl(r0, 0xffffffff80000001, &(0x7f00000000c0)="68962351a410e118d85d1757749e1675edd95da2356b2e1b6c3ef1953759117f2515236846cea0e2ce25c6db17095f6ba300f564e2b7d9237d15238fac1defcbaee17606e11a7426bb433ed76b6a9674853a9bf33195f1c50b5ebfd0f45e5547210c1aab5db16c9fa4daedb68f150168c4e760b8ad717711f026b751eaa62d1a5d9bc1df4ba1f28352eac9086c7b1fda9ddaa1932979eb7f50a5eac973bc15feaa6a32346eefc13e37c07e09f3") r9 = socket$inet(0x2, 0x3, 0x2) accept4(r2, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000200)=0x80, 0x800) setsockopt$nfc_llcp_NFC_LLCP_RW(r10, 0x118, 0x0, &(0x7f0000000240)=0x22, 0x4) setsockopt$inet_int(r9, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) [ 912.224947][T13391] IPVS: ftp: loaded support on port[0] = 21 01:42:28 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f3188b070") ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x40000002}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x2203, 0x0) [ 912.299582][T13392] IPVS: ftp: loaded support on port[0] = 21 [ 912.457967][ T26] audit: type=1804 audit(1552959748.691:40): pid=13404 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir874913707/syzkaller.PDcLXZ/64/memory.events" dev="sda1" ino=16686 res=1 01:42:28 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'bridge_slave_1\x00', {0x2, 0x4e20, @local}}) accept4(r0, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f00000000c0)=0x80, 0x800) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400088}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x100, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r4, 0x0, 0x2c, &(0x7f0000007ff4)={@loopback, @multicast1}, 0x108) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2c, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 912.615455][ T26] audit: type=1804 audit(1552959748.851:41): pid=13404 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir874913707/syzkaller.PDcLXZ/64/memory.events" dev="sda1" ino=16686 res=1 01:42:29 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'bridge_slave_1\x00', {0x2, 0x4e20, @local}}) accept4(r0, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f00000000c0)=0x80, 0x800) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400088}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x100, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r4, 0x0, 0x2c, &(0x7f0000007ff4)={@loopback, @multicast1}, 0x108) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2c, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 01:42:29 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x3ff800) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 01:42:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="d9a34fff", 0x4) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0xfffffdd5) recvmmsg(r2, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000400)=""/178, 0xb2}], 0x1}}, {{0x0, 0x0, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/214, 0xd6}], 0x1, 0x0, 0xfffffffffffffd6f}}], 0x2, 0x0, 0x0) 01:42:29 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x3ff800) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 01:42:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="d9a34fff", 0x4) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0xfffffdd5) recvmmsg(r2, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000400)=""/178, 0xb2}], 0x1}}, {{0x0, 0x0, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/214, 0xd6}], 0x1, 0x0, 0xfffffffffffffd6f}}], 0x2, 0x0, 0x0) [ 913.989020][ C0] net_ratelimit: 14351 callbacks suppressed [ 913.989036][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 913.989436][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 913.995584][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 914.007156][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 914.019547][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 914.031028][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 914.043355][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 914.055126][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 914.066961][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 914.078762][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) 01:42:30 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x3ff800) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 01:42:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="d9a34fff", 0x4) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0xfffffdd5) recvmmsg(r2, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000400)=""/178, 0xb2}], 0x1}}, {{0x0, 0x0, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/214, 0xd6}], 0x1, 0x0, 0xfffffffffffffd6f}}], 0x2, 0x0, 0x0) 01:42:31 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x3ff800) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 01:42:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r1, 0x1, 0x3c, &(0x7f0000000080)={0x1}, 0x8) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x24000080, 0x0, 0x0) ppoll(&(0x7f0000000040)=[{r1, 0x2}, {r0}], 0x2, 0x0, 0x0, 0x0) 01:42:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x7}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 01:42:33 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x3ff800) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 01:42:33 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) connect$nfc_llcp(r0, &(0x7f0000000140)={0x27, 0x4, 0x0, 0x0, 0x0, 0x0, "1a480630c3fcafda1784eb6399cd519d16e4928ca8afe628134f6d71b98ced39cbe79060cf13cdd611e9f095be06e4f3d6d4944874009bdd5a53efac54e786", 0x2f}, 0x60) 01:42:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x3ff800) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 01:42:33 executing program 0: r0 = socket(0x22, 0x2, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000000)) 01:42:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x47}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) 01:42:33 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xfb) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bond0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'bond0\x00', 0x800000000008a03}) 01:42:33 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, &(0x7f0000001300)=""/235, 0xffffffffffffffff) 01:42:33 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000000000000bfa30000000000005503000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000015d6405000000000065040400010000003404000001000000b7050000000000006a0a00fe00000000850000005a000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 01:42:33 executing program 5: socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@dev}}, {{@in=@local}}}, &(0x7f0000000080)=0x57) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) r3 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000040)=0x8000000000004, 0xe3) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000ff5ffc), 0x4) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000680)={0x0, @in={{0x2, 0x4e20, @local}}}, &(0x7f0000000240)=0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000003c0)={0x0, 0x3f800, 0x8, 0x0, 0xfffffffffffff8f6, 0x4, 0x9, 0x80000000, r5}, 0x0) r6 = socket$inet(0x2, 0x0, 0x0) r7 = socket$packet(0x11, 0x2, 0x300) clock_gettime(0x0, 0x0) setsockopt$packet_fanout(r7, 0x107, 0x12, &(0x7f0000001040)={0x0, 0x3}, 0x4) sendto$inet(r3, &(0x7f0000865000), 0x0, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x6}, &(0x7f0000000100), &(0x7f0000000140)={0x2a}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket$pppoe(0x18, 0x1, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r6, 0x84, 0x7b, &(0x7f0000000540)={0x0, 0xfffffffffffff000}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000600), 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000180), &(0x7f0000000640)=0x4) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r9 = openat$cgroup_subtree(r8, &(0x7f0000001500)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0xa, 0x1010, r9, 0x0) 01:42:34 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000100), 0x4) 01:42:34 executing program 2: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) connect$caif(r0, 0x0, 0x0) 01:42:34 executing program 4: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x13, 0x0, 0x0) 01:42:34 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f00000034c0)="4c0000001200ff09fffefd9567a283b724a600800000000000000068354046002c001d0000000000fcbda5f33ab6821148a730de33a49868c62b2ca63d89613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) [ 918.373489][T13509] netlink: 'syz-executor.4': attribute type 29 has an invalid length. 01:42:34 executing program 5: socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@dev}}, {{@in=@local}}}, &(0x7f0000000080)=0x57) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) r3 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000040)=0x8000000000004, 0xe3) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000ff5ffc), 0x4) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000680)={0x0, @in={{0x2, 0x4e20, @local}}}, &(0x7f0000000240)=0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000003c0)={0x0, 0x3f800, 0x8, 0x0, 0xfffffffffffff8f6, 0x4, 0x9, 0x80000000, r5}, 0x0) r6 = socket$inet(0x2, 0x0, 0x0) r7 = socket$packet(0x11, 0x2, 0x300) clock_gettime(0x0, 0x0) setsockopt$packet_fanout(r7, 0x107, 0x12, &(0x7f0000001040)={0x0, 0x3}, 0x4) sendto$inet(r3, &(0x7f0000865000), 0x0, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x6}, &(0x7f0000000100), &(0x7f0000000140)={0x2a}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket$pppoe(0x18, 0x1, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r6, 0x84, 0x7b, &(0x7f0000000540)={0x0, 0xfffffffffffff000}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000600), 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000180), &(0x7f0000000640)=0x4) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r9 = openat$cgroup_subtree(r8, &(0x7f0000001500)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0xa, 0x1010, r9, 0x0) 01:42:34 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x3ff800) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) [ 918.619626][T13478] 8021q: adding VLAN 0 to HW filter on device bond0 [ 918.629443][T13478] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 918.999380][ C0] net_ratelimit: 14942 callbacks suppressed [ 918.999404][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 919.004965][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 919.006074][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 919.018225][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 919.030303][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 919.041859][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 919.053727][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 919.066767][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 919.078918][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 919.090702][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 919.111948][T13502] 8021q: adding VLAN 0 to HW filter on device bond0 01:42:35 executing program 3: socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@dev}}, {{@in=@local}}}, &(0x7f0000000080)=0x57) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) r3 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000040)=0x8000000000004, 0xe3) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000ff5ffc), 0x4) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000680)={0x0, @in={{0x2, 0x4e20, @local}}}, &(0x7f0000000240)=0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000003c0)={0x0, 0x3f800, 0x8, 0x0, 0xfffffffffffff8f6, 0x4, 0x9, 0x80000000, r5}, 0x0) r6 = socket$inet(0x2, 0x0, 0x0) r7 = socket$packet(0x11, 0x2, 0x300) clock_gettime(0x0, 0x0) setsockopt$packet_fanout(r7, 0x107, 0x12, &(0x7f0000001040)={0x0, 0x3}, 0x4) sendto$inet(r3, &(0x7f0000865000), 0x0, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x6}, &(0x7f0000000100), &(0x7f0000000140)={0x2a}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket$pppoe(0x18, 0x1, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r6, 0x84, 0x7b, &(0x7f0000000540)={0x0, 0xfffffffffffff000}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000600), 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000180), &(0x7f0000000640)=0x4) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r9 = openat$cgroup_subtree(r8, &(0x7f0000001500)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0xa, 0x1010, r9, 0x0) 01:42:35 executing program 0: r0 = socket(0x848000000015, 0x805, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, 0x1c) [ 919.152365][T13502] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 919.179163][T13509] netlink: 'syz-executor.4': attribute type 29 has an invalid length. 01:42:35 executing program 0: pipe(&(0x7f0000000740)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) pread64(r1, &(0x7f00000004c0)=""/191, 0xbf, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000240)={0x1, {{0xa, 0x4e20, 0x8, @ipv4={[], [], @loopback}, 0x3}}, {{0xa, 0x4e22, 0x3, @local, 0x84e}}}, 0x108) mmap(&(0x7f0000f44000/0x4000)=nil, 0x507000, 0x1000007, 0x2013, r1, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000480), &(0x7f0000000140)=0x4) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) sendmsg$nl_generic(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000004}, 0xc, &(0x7f0000000180)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20004080}, 0xb5126b28a2d547d5) vmsplice(r0, &(0x7f00000005c0), 0x1, 0xa) socket$rds(0x15, 0x5, 0x0) r2 = socket$inet6(0xa, 0x80000, 0xffffffffffffffff) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r2) unshare(0x32000000) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000002c40), 0x4) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r3, 0x89a0, &(0x7f00000000c0)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r3, 0x89a1, &(0x7f0000000180)='bcsf0\x00\x00\x00\x00\x00\x00\x00\x11\x00') 01:42:35 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x30, 0x0, 0x0) 01:42:35 executing program 5: socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@dev}}, {{@in=@local}}}, &(0x7f0000000080)=0x57) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) r3 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000040)=0x8000000000004, 0xe3) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000ff5ffc), 0x4) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000680)={0x0, @in={{0x2, 0x4e20, @local}}}, &(0x7f0000000240)=0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000003c0)={0x0, 0x3f800, 0x8, 0x0, 0xfffffffffffff8f6, 0x4, 0x9, 0x80000000, r5}, 0x0) r6 = socket$inet(0x2, 0x0, 0x0) r7 = socket$packet(0x11, 0x2, 0x300) clock_gettime(0x0, 0x0) setsockopt$packet_fanout(r7, 0x107, 0x12, &(0x7f0000001040)={0x0, 0x3}, 0x4) sendto$inet(r3, &(0x7f0000865000), 0x0, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x6}, &(0x7f0000000100), &(0x7f0000000140)={0x2a}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket$pppoe(0x18, 0x1, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r6, 0x84, 0x7b, &(0x7f0000000540)={0x0, 0xfffffffffffff000}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000600), 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000180), &(0x7f0000000640)=0x4) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r9 = openat$cgroup_subtree(r8, &(0x7f0000001500)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0xa, 0x1010, r9, 0x0) 01:42:36 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x0, 0x0, 0x204}, 0x20) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)='@', 0x1}], 0x1) 01:42:36 executing program 3: socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@dev}}, {{@in=@local}}}, &(0x7f0000000080)=0x57) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) r3 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000040)=0x8000000000004, 0xe3) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000ff5ffc), 0x4) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000680)={0x0, @in={{0x2, 0x4e20, @local}}}, &(0x7f0000000240)=0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000003c0)={0x0, 0x3f800, 0x8, 0x0, 0xfffffffffffff8f6, 0x4, 0x9, 0x80000000, r5}, 0x0) r6 = socket$inet(0x2, 0x0, 0x0) r7 = socket$packet(0x11, 0x2, 0x300) clock_gettime(0x0, 0x0) setsockopt$packet_fanout(r7, 0x107, 0x12, &(0x7f0000001040)={0x0, 0x3}, 0x4) sendto$inet(r3, &(0x7f0000865000), 0x0, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x6}, &(0x7f0000000100), &(0x7f0000000140)={0x2a}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket$pppoe(0x18, 0x1, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r6, 0x84, 0x7b, &(0x7f0000000540)={0x0, 0xfffffffffffff000}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000600), 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000180), &(0x7f0000000640)=0x4) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r9 = openat$cgroup_subtree(r8, &(0x7f0000001500)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0xa, 0x1010, r9, 0x0) 01:42:38 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x1, 0x8, 0x20000000000001, 0x0, 0x1}, 0x20f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x18) 01:42:38 executing program 5: socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@dev}}, {{@in=@local}}}, &(0x7f0000000080)=0x57) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) r3 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000040)=0x8000000000004, 0xe3) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000ff5ffc), 0x4) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000680)={0x0, @in={{0x2, 0x4e20, @local}}}, &(0x7f0000000240)=0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000003c0)={0x0, 0x3f800, 0x8, 0x0, 0xfffffffffffff8f6, 0x4, 0x9, 0x80000000, r5}, 0x0) r6 = socket$inet(0x2, 0x0, 0x0) r7 = socket$packet(0x11, 0x2, 0x300) clock_gettime(0x0, 0x0) setsockopt$packet_fanout(r7, 0x107, 0x12, &(0x7f0000001040)={0x0, 0x3}, 0x4) sendto$inet(r3, &(0x7f0000865000), 0x0, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x6}, &(0x7f0000000100), &(0x7f0000000140)={0x2a}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket$pppoe(0x18, 0x1, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r6, 0x84, 0x7b, &(0x7f0000000540)={0x0, 0xfffffffffffff000}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000600), 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000180), &(0x7f0000000640)=0x4) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r9 = openat$cgroup_subtree(r8, &(0x7f0000001500)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0xa, 0x1010, r9, 0x0) 01:42:38 executing program 3: socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@dev}}, {{@in=@local}}}, &(0x7f0000000080)=0x57) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) r3 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000040)=0x8000000000004, 0xe3) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000ff5ffc), 0x4) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000680)={0x0, @in={{0x2, 0x4e20, @local}}}, &(0x7f0000000240)=0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000003c0)={0x0, 0x3f800, 0x8, 0x0, 0xfffffffffffff8f6, 0x4, 0x9, 0x80000000, r5}, 0x0) r6 = socket$inet(0x2, 0x0, 0x0) r7 = socket$packet(0x11, 0x2, 0x300) clock_gettime(0x0, 0x0) setsockopt$packet_fanout(r7, 0x107, 0x12, &(0x7f0000001040)={0x0, 0x3}, 0x4) sendto$inet(r3, &(0x7f0000865000), 0x0, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x6}, &(0x7f0000000100), &(0x7f0000000140)={0x2a}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket$pppoe(0x18, 0x1, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r6, 0x84, 0x7b, &(0x7f0000000540)={0x0, 0xfffffffffffff000}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000600), 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000180), &(0x7f0000000640)=0x4) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r9 = openat$cgroup_subtree(r8, &(0x7f0000001500)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0xa, 0x1010, r9, 0x0) 01:42:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) pipe(0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000340)={0x20}) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) pwrite64(r1, &(0x7f00000003c0)=' ', 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x10076) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r1, 0x0, 0xa, 0x0, 0x1100}) 01:42:38 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x0, 0x0, 0x204}, 0x20) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)='@', 0x1}], 0x1) 01:42:38 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=@newspdinfo={0x1c, 0x24, 0x1, 0x0, 0x0, 0x0, [@ipv4_hthresh={0x8, 0x4, {0xf0}}]}, 0x1c}}, 0x0) 01:42:38 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={&(0x7f0000000100)={0x10, 0x5}, 0xc, &(0x7f0000beeff0)={&(0x7f000063de2c)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev}, {@in6=@mcast2, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_aead={0x4c, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x3f000000}}]}, 0x13c}}, 0x0) 01:42:40 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCRSGCAUSE(r0, 0x89e1, &(0x7f00000000c0)) 01:42:40 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={&(0x7f0000000100)={0x10, 0x5}, 0xc, &(0x7f0000beeff0)={&(0x7f000063de2c)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev}, {@in6=@mcast2, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_aead={0x4c, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x3f000000}}]}, 0x13c}}, 0x0) 01:42:40 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x0, 0x0, 0x204}, 0x20) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)='@', 0x1}], 0x1) 01:42:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_emit_ethernet(0x3e, &(0x7f0000000040)={@random="9f5fd736f08c", @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "ca819d", 0x8, 0x3a, 0x0, @dev, @local, {[], @icmpv6=@echo_request}}}}}, 0x0) 01:42:40 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x0, 0x0, 0x204}, 0x20) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)='@', 0x1}], 0x1) 01:42:40 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={&(0x7f0000000100)={0x10, 0x5}, 0xc, &(0x7f0000beeff0)={&(0x7f000063de2c)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev}, {@in6=@mcast2, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_aead={0x4c, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x3f000000}}]}, 0x13c}}, 0x0) [ 924.009065][ C0] net_ratelimit: 13119 callbacks suppressed [ 924.009081][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 924.009289][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 924.040042][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 924.042187][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 924.053092][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 924.064770][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 924.076288][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 924.088659][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 924.100144][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 924.112518][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 01:42:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcf, 0x0, 0x4) 01:42:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_emit_ethernet(0x3e, &(0x7f0000000040)={@random="9f5fd736f08c", @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "ca819d", 0x8, 0x3a, 0x0, @dev, @local, {[], @icmpv6=@echo_request}}}}}, 0x0) 01:42:43 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={&(0x7f0000000100)={0x10, 0x5}, 0xc, &(0x7f0000beeff0)={&(0x7f000063de2c)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev}, {@in6=@mcast2, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_aead={0x4c, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x3f000000}}]}, 0x13c}}, 0x0) 01:42:43 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x2, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xf, 0xffffff97}}, &(0x7f0000000000)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) 01:42:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) pipe(0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000340)={0x20}) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) pwrite64(r1, &(0x7f00000003c0)=' ', 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x10076) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r1, 0x0, 0xa, 0x0, 0x1100}) 01:42:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) bind$packet(r1, &(0x7f0000000440)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000280)=0xfb8, 0x4) write$binfmt_aout(r1, &(0x7f0000000580)={{0x810f, 0x0, 0x0, 0xfffffffffffffffd}}, 0x20) 01:42:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_emit_ethernet(0x3e, &(0x7f0000000040)={@random="9f5fd736f08c", @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "ca819d", 0x8, 0x3a, 0x0, @dev, @local, {[], @icmpv6=@echo_request}}}}}, 0x0) 01:42:43 executing program 5: socket$inet6_sctp(0xa, 0x801, 0x84) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x2a}, 0xc) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @local}}, 0x0, 0x2, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r0, &(0x7f0000000500)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x8, "4279ffced901fd77"}, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x804}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x380531a9) 01:42:43 executing program 2: r0 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000600)="5500000018007f5300fe01b2403b7bbb0a60000000a84302910000003900040035000c00020000000d000500000000000000c78b800823090000009d566885b167320b00dc1338d54400009b84136ef75afb83de44", 0x55}], 0x1}, 0x0) 01:42:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcf, 0x0, 0x4) [ 927.378062][T13675] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 01:42:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcf, 0x0, 0x4) 01:42:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_emit_ethernet(0x3e, &(0x7f0000000040)={@random="9f5fd736f08c", @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "ca819d", 0x8, 0x3a, 0x0, @dev, @local, {[], @icmpv6=@echo_request}}}}}, 0x0) [ 927.489253][T13675] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 01:42:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcf, 0x0, 0x4) 01:42:43 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000100)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000000)="e1a28ee602000000000000000800424c040f09f0d6b0e536cf858da2b7f7a5ead288", 0x22}], 0x1}, 0x0) 01:42:44 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x200000012, &(0x7f0000000000), 0x4) 01:42:44 executing program 3: r0 = socket(0xa, 0x802, 0x88) r1 = socket$netlink(0x10, 0x3, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) writev(r1, &(0x7f0000fb1000)=[{&(0x7f0000000000)="480000001400197f09004b0109048c590a88bfffff010001000000000028213ee20600d4ff5bffff00c7e5ed5e0000000000d5a49b19007a9eace3dbe8b12c000000000000000000", 0x48}], 0x1) recvmsg(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 01:42:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) pipe(0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000340)={0x20}) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) pwrite64(r1, &(0x7f00000003c0)=' ', 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x10076) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r1, 0x0, 0xa, 0x0, 0x1100}) 01:42:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) bind$packet(r1, &(0x7f0000000440)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000280)=0xfb8, 0x4) write$binfmt_aout(r1, &(0x7f0000000580)={{0x810f, 0x0, 0x0, 0xfffffffffffffffd}}, 0x20) 01:42:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) bind$packet(r1, &(0x7f0000000440)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000280)=0xfb8, 0x4) write$binfmt_aout(r1, &(0x7f0000000580)={{0x810f, 0x0, 0x0, 0xfffffffffffffffd}}, 0x20) 01:42:44 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1}, 0xcc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f00000002c0), &(0x7f0000000080)=""/140}, 0x18) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000180)={0x7, 0x81}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000180)}, 0x10) 01:42:44 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000100)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000000)="e1a28ee602000000000000000800424c040f09f0d6b0e536cf858da2b7f7a5ead288", 0x22}], 0x1}, 0x0) 01:42:44 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)={0x54, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x40, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:\nyz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @local}}, {0x14, 0x2, @in={0x2, 0x0, @remote}}}}]}]}, 0x54}}, 0x0) 01:42:44 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="5500000018007f1412fe01b2a4a280930a06000000a84306910000000b000f0035020000060000001900154007000001d40000dc1338d54400009b84136ef75afb83de44110016000d0004000000060cec4faba7d4", 0x55}], 0x1}, 0x0) 01:42:44 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000100)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000000)="e1a28ee602000000000000000800424c040f09f0d6b0e536cf858da2b7f7a5ead288", 0x22}], 0x1}, 0x0) [ 928.350623][T13710] Started in network mode [ 928.358769][T13710] Own node identity ac1414aa, cluster identity 4711 [ 928.388678][T13710] New replicast peer: 172.20.20.187 [ 928.433366][T13710] Enabled bearer , priority 10 [ 928.512704][T13726] netlink: 'syz-executor.0': attribute type 15 has an invalid length. 01:42:44 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000100)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000000)="e1a28ee602000000000000000800424c040f09f0d6b0e536cf858da2b7f7a5ead288", 0x22}], 0x1}, 0x0) [ 928.557107][T13726] netlink: 'syz-executor.0': attribute type 21 has an invalid length. [ 928.589928][T13727] Enabling of bearer rejected, already enabled 01:42:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) bind$packet(r1, &(0x7f0000000440)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000280)=0xfb8, 0x4) write$binfmt_aout(r1, &(0x7f0000000580)={{0x810f, 0x0, 0x0, 0xfffffffffffffffd}}, 0x20) 01:42:44 executing program 0: mmap(&(0x7f0000000000/0x237000)=nil, 0x237000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) getsockopt$bt_hci(r0, 0x0, 0x60, &(0x7f00001e3000)=""/30, &(0x7f0000d23000)=0x44) 01:42:44 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000519fa8)=@framed={{}, [@ldst={0x5, 0x0, 0x4, 0x0, 0x51}]}, &(0x7f0000000000)='G.\xdd:@\x83\xb90PL\x00', 0x8000, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) [ 929.023801][ C0] net_ratelimit: 13921 callbacks suppressed [ 929.023817][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 929.027480][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 929.030115][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 929.042160][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 929.054752][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 929.066893][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 929.079142][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 929.090634][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 929.102967][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 929.114474][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 929.446977][ T7796] 32-bit node address hash set to aa1414ac 01:42:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) pipe(0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000340)={0x20}) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) pwrite64(r1, &(0x7f00000003c0)=' ', 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x10076) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r1, 0x0, 0xa, 0x0, 0x1100}) 01:42:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) bind$packet(r1, &(0x7f0000000440)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000280)=0xfb8, 0x4) write$binfmt_aout(r1, &(0x7f0000000580)={{0x810f, 0x0, 0x0, 0xfffffffffffffffd}}, 0x20) 01:42:47 executing program 0: r0 = socket(0x2000000000000021, 0x2, 0x2) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[{0x18, 0x110, 0x100000001, 'w'}], 0x18}}], 0x1, 0x0) 01:42:47 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x6, 0x2000000000) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003dc0)={0x0, @loopback}, &(0x7f0000003e00)=0xc) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000003e40)={@loopback, r2}, 0x14) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000400)={&(0x7f0000000200)=@ll={0x11, 0x0, 0x0}, 0x389, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/19, 0x280}, {0xffffffffffffffff, 0x17e}, {&(0x7f00000002c0)=""/217, 0x22d}], 0x3, 0x0, 0x20, 0x5}, 0x21) connect$inet6(r1, &(0x7f0000000900)={0xa, 0x4e24, 0x0, @mcast1, 0x3}, 0xa) pipe(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000800)={r4}) getsockopt$bt_BT_RCVMTU(r5, 0x112, 0xd, &(0x7f0000000c00)=0x2, &(0x7f00000006c0)=0x2) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000880), &(0x7f0000000940)=0xffffffffffffffac) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='rdma.current\x00', 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r6, 0x119, 0x1, &(0x7f00000005c0), 0x3a1) setsockopt$inet6_int(r1, 0x29, 0x4, &(0x7f0000000080)=0x4, 0x4) getsockname$inet6(r1, &(0x7f0000000580), &(0x7f0000000c80)=0x1c) sendmsg$IPVS_CMD_SET_DEST(r6, &(0x7f00000007c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000780)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="010029bd7000ffdbdf25060000006800030008000100010000001400060000000000840000000000ffff0000000614000600fe80000000000000000000000000000d080004000200000014000600fe8000000000000000000000000000120800040002000000080007004e21000008000400388c00e80700050002000000040003003c0001e3080009f379000000080004004e2400000c00070005006d11836be1bba80097cf04f6ac0d00000c0000000c0007000c00000029000000080001000a00100008000600666f0000480003000800010001000000080000ac1414aa0800010001000000140006000000000000000000000000000000000108000100000000000800030002000000140002000800060009000000080068500a79bc0908004a0300005c0c7630cb353985c11cb0c632aaa56848343e0b3f36bee45a8e426a3d568cf94ffd60a730f66121826a024ae60b56e4f85eae819bf327774cd3fba1a7fda1d77cae9d93e51b87673378ec9a5fde48cf75ccedf1b3d8aa4893630acf0fe4f7ed8fb6ec4fa3e1ef4613aa119f2b84b80200514702450d75e38ab8be504619a05a7e28093d80ce0b40c26fe965dc5d0e65941ed83696db64ecd1513a1993c639fb5a1dd0aee2e29f285763d8d093650c3ae09c5caa66ab933e956c4a312d4e35b3601e69270ec97292e728c1fbc053075b5c7a47678dd068d34eb229532c75c05e1edf8ef46b8c1842ae1ee014dff3ce7b327f7867eeec62d47c1b695bb30817c57da2a3cecb4e537cc92246e228c86261c0f6c183fac2e55740947f528f62ab601e6954dbbf9a332ef65d219c75ef591357e55b7785a659edecd6fd75ea1d52915f73bd900bc80e"], 0x1}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) unshare(0x40000000) getsockopt$inet6_tcp_buf(r6, 0x6, 0x0, &(0x7f0000000a80)=""/83, &(0x7f0000000280)=0x53) r7 = socket$inet6(0xa, 0x3, 0x3a) socket$xdp(0x2c, 0x3, 0x0) socketpair(0x2, 0x80000, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) connect$packet(r8, &(0x7f0000000680)={0x11, 0xfd, r3, 0x1, 0x3, 0x6, @link_local}, 0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000440)=0x4) setsockopt$RDS_CANCEL_SENT_TO(r5, 0x114, 0x1, &(0x7f0000000700)={0x2, 0x4e23, @multicast2}, 0x10) sendmsg$IPVS_CMD_FLUSH(r6, &(0x7f00000010c0)={&(0x7f0000000d40)={0x10, 0x0, 0x0, 0x3ffe}, 0xc, &(0x7f0000000d80)={&(0x7f0000000480)=ANY=[@ANYBLOB="04006fbd709aeb5fa60d17bc343ec4bb0000414de85bca727087ec7239045dfc05ad29adf22ab3587f0000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x8011) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000840)={r4, r6, 0x0, 0x2}, 0x10) bind$rds(r7, &(0x7f0000000500)={0x2, 0x4e20, @remote}, 0x10) setsockopt$inet6_int(r7, 0x29, 0xc8, &(0x7f00000004c0)=0x1, 0x38e) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000600)={0x1, 0x1, 0x7, 0x4}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r7, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x1, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @local}}, 0x5c) 01:42:47 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x400000000000072, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000140)) 01:42:47 executing program 0: r0 = socket(0x2000000000000021, 0x2, 0x2) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[{0x18, 0x110, 0x100000001, 'w'}], 0x18}}], 0x1, 0x0) [ 931.314666][T13757] IPVS: ftp: loaded support on port[0] = 21 01:42:47 executing program 0: r0 = socket(0x2000000000000021, 0x2, 0x2) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[{0x18, 0x110, 0x100000001, 'w'}], 0x18}}], 0x1, 0x0) 01:42:47 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000045c0)={&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @remote, 0x1d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000140)="dd", 0x1}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x7, &(0x7f00000007c0), 0x4) 01:42:48 executing program 0: r0 = socket(0x2000000000000021, 0x2, 0x2) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[{0x18, 0x110, 0x100000001, 'w'}], 0x18}}], 0x1, 0x0) 01:42:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) bind$packet(r1, &(0x7f0000000440)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000280)=0xfb8, 0x4) write$binfmt_aout(r1, &(0x7f0000000580)={{0x810f, 0x0, 0x0, 0xfffffffffffffffd}}, 0x20) 01:42:48 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0x5, 0x1, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) connect$vsock_dgram(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0xffffffff, @host}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000180), &(0x7f0000001440)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000280)={r0, &(0x7f0000000080), &(0x7f00000003c0)=""/128}, 0x18) 01:42:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) bind$packet(r1, &(0x7f0000000440)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000280)=0xfb8, 0x4) write$binfmt_aout(r1, &(0x7f0000000580)={{0x810f, 0x0, 0x0, 0xfffffffffffffffd}}, 0x20) 01:42:48 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0xc, 0x0, &(0x7f0000000280)) 01:42:48 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x100002}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'}, 0x48) 01:42:48 executing program 2: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffee1, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x66, 0x0, 0x0) r3 = socket(0x0, 0x800, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0) clock_gettime(0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) listen(r1, 0xfffffffffffffffb) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r4, 0x820, 0x0, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x8d4}, 0x20000000) ppoll(&(0x7f0000000340)=[{0xffffffffffffffff, 0x8}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000b80)='IPVS\x00') setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r4, 0x600, 0x70bd2d, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x840) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000180)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, 0x0, 0x0, [{}]}, 0x88) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) ppoll(&(0x7f0000000500)=[{r1, 0x2103}], 0xc, &(0x7f0000000580)={0x0, r2+10000000}, &(0x7f00000005c0), 0x8) [ 932.157086][T13806] IPVS: ftp: loaded support on port[0] = 21 [ 934.029048][ C0] net_ratelimit: 15637 callbacks suppressed [ 934.029064][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 934.029448][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 934.035618][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 934.047220][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 934.059568][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 934.071464][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 934.083858][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 934.095675][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 934.108313][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 934.120213][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) 01:42:50 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x6, 0x2000000000) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003dc0)={0x0, @loopback}, &(0x7f0000003e00)=0xc) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000003e40)={@loopback, r2}, 0x14) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000400)={&(0x7f0000000200)=@ll={0x11, 0x0, 0x0}, 0x389, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/19, 0x280}, {0xffffffffffffffff, 0x17e}, {&(0x7f00000002c0)=""/217, 0x22d}], 0x3, 0x0, 0x20, 0x5}, 0x21) connect$inet6(r1, &(0x7f0000000900)={0xa, 0x4e24, 0x0, @mcast1, 0x3}, 0xa) pipe(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000800)={r4}) getsockopt$bt_BT_RCVMTU(r5, 0x112, 0xd, &(0x7f0000000c00)=0x2, &(0x7f00000006c0)=0x2) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000880), &(0x7f0000000940)=0xffffffffffffffac) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='rdma.current\x00', 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r6, 0x119, 0x1, &(0x7f00000005c0), 0x3a1) setsockopt$inet6_int(r1, 0x29, 0x4, &(0x7f0000000080)=0x4, 0x4) getsockname$inet6(r1, &(0x7f0000000580), &(0x7f0000000c80)=0x1c) sendmsg$IPVS_CMD_SET_DEST(r6, &(0x7f00000007c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000780)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) unshare(0x40000000) getsockopt$inet6_tcp_buf(r6, 0x6, 0x0, &(0x7f0000000a80)=""/83, &(0x7f0000000280)=0x53) r7 = socket$inet6(0xa, 0x3, 0x3a) socket$xdp(0x2c, 0x3, 0x0) socketpair(0x2, 0x80000, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) connect$packet(r8, &(0x7f0000000680)={0x11, 0xfd, r3, 0x1, 0x3, 0x6, @link_local}, 0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000440)=0x4) setsockopt$RDS_CANCEL_SENT_TO(r5, 0x114, 0x1, &(0x7f0000000700)={0x2, 0x4e23, @multicast2}, 0x10) sendmsg$IPVS_CMD_FLUSH(r6, &(0x7f00000010c0)={&(0x7f0000000d40)={0x10, 0x0, 0x0, 0x3ffe}, 0xc, &(0x7f0000000d80)={&(0x7f0000000480)=ANY=[@ANYBLOB="04006fbd709aeb5fa60d17bc343ec4bb0000414de85bca727087ec7239045dfc05ad29adf22ab3587f0000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x8011) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000840)={r4, r6, 0x0, 0x2}, 0x10) bind$rds(r7, &(0x7f0000000500)={0x2, 0x4e20, @remote}, 0x10) setsockopt$inet6_int(r7, 0x29, 0xc8, &(0x7f00000004c0)=0x1, 0x38e) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000600)={0x1, 0x1, 0x7, 0x4}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r7, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x1, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @local}}, 0x5c) 01:42:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @remote}, {0xa, 0x0, 0x0, @mcast2}}, 0x29e) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x14}, 0x14}}, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) 01:42:50 executing program 3: r0 = socket$packet(0x11, 0x100000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x200, 0xfe61) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000004500)={'bridge0\x00', 0x0}) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000000)=0x2, 0x4) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="32cae4783d32"}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="050300000900000000000000c52cf7c2ffffe697b02f0806", 0x18, 0x0, 0x0, 0x0) 01:42:50 executing program 4: bpf$MAP_CREATE(0xf, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) 01:42:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000300)=@updsa={0x140, 0x1a, 0x21, 0x0, 0x0, {{@in6=@loopback, @in=@remote}, {@in6=@loopback, 0x0, 0x6c}, @in=@remote, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}, @extra_flags={0x8}]}, 0x140}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") 01:42:51 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x6, 0x2000000000) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003dc0)={0x0, @loopback}, &(0x7f0000003e00)=0xc) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000003e40)={@loopback, r2}, 0x14) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000400)={&(0x7f0000000200)=@ll={0x11, 0x0, 0x0}, 0x389, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/19, 0x280}, {0xffffffffffffffff, 0x17e}, {&(0x7f00000002c0)=""/217, 0x22d}], 0x3, 0x0, 0x20, 0x5}, 0x21) connect$inet6(r1, &(0x7f0000000900)={0xa, 0x4e24, 0x0, @mcast1, 0x3}, 0xa) pipe(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000800)={r4}) getsockopt$bt_BT_RCVMTU(r5, 0x112, 0xd, &(0x7f0000000c00)=0x2, &(0x7f00000006c0)=0x2) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000880), &(0x7f0000000940)=0xffffffffffffffac) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='rdma.current\x00', 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r6, 0x119, 0x1, &(0x7f00000005c0), 0x3a1) setsockopt$inet6_int(r1, 0x29, 0x4, &(0x7f0000000080)=0x4, 0x4) getsockname$inet6(r1, &(0x7f0000000580), &(0x7f0000000c80)=0x1c) sendmsg$IPVS_CMD_SET_DEST(r6, &(0x7f00000007c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000780)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) unshare(0x40000000) getsockopt$inet6_tcp_buf(r6, 0x6, 0x0, &(0x7f0000000a80)=""/83, &(0x7f0000000280)=0x53) r7 = socket$inet6(0xa, 0x3, 0x3a) socket$xdp(0x2c, 0x3, 0x0) socketpair(0x2, 0x80000, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) connect$packet(r8, &(0x7f0000000680)={0x11, 0xfd, r3, 0x1, 0x3, 0x6, @link_local}, 0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000440)=0x4) setsockopt$RDS_CANCEL_SENT_TO(r5, 0x114, 0x1, &(0x7f0000000700)={0x2, 0x4e23, @multicast2}, 0x10) sendmsg$IPVS_CMD_FLUSH(r6, &(0x7f00000010c0)={&(0x7f0000000d40)={0x10, 0x0, 0x0, 0x3ffe}, 0xc, &(0x7f0000000d80)={&(0x7f0000000480)=ANY=[@ANYBLOB="04006fbd709aeb5fa60d17bc343ec4bb0000414de85bca727087ec7239045dfc05ad29adf22ab3587f0000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x8011) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000840)={r4, r6, 0x0, 0x2}, 0x10) bind$rds(r7, &(0x7f0000000500)={0x2, 0x4e20, @remote}, 0x10) setsockopt$inet6_int(r7, 0x29, 0xc8, &(0x7f00000004c0)=0x1, 0x38e) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000600)={0x1, 0x1, 0x7, 0x4}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r7, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x1, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @local}}, 0x5c) [ 934.778957][T13835] IPVS: ftp: loaded support on port[0] = 21 [ 934.859534][T13838] IPVS: ftp: loaded support on port[0] = 21 [ 934.895098][T13845] IPVS: ftp: loaded support on port[0] = 21 01:42:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000300)=@updsa={0x140, 0x1a, 0x21, 0x0, 0x0, {{@in6=@loopback, @in=@remote}, {@in6=@loopback, 0x0, 0x6c}, @in=@remote, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}, @extra_flags={0x8}]}, 0x140}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") [ 935.897226][T13868] IPVS: ftp: loaded support on port[0] = 21 01:42:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000300)=@updsa={0x140, 0x1a, 0x21, 0x0, 0x0, {{@in6=@loopback, @in=@remote}, {@in6=@loopback, 0x0, 0x6c}, @in=@remote, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}, @extra_flags={0x8}]}, 0x140}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") 01:42:54 executing program 2: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffee1, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x66, 0x0, 0x0) r3 = socket(0x0, 0x800, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0) clock_gettime(0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) listen(r1, 0xfffffffffffffffb) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r4, 0x820, 0x0, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x8d4}, 0x20000000) ppoll(&(0x7f0000000340)=[{0xffffffffffffffff, 0x8}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000b80)='IPVS\x00') setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r4, 0x600, 0x70bd2d, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x840) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000180)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, 0x0, 0x0, [{}]}, 0x88) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) ppoll(&(0x7f0000000500)=[{r1, 0x2103}], 0xc, &(0x7f0000000580)={0x0, r2+10000000}, &(0x7f00000005c0), 0x8) [ 939.038986][ C1] net_ratelimit: 15504 callbacks suppressed [ 939.039003][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 939.049104][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 939.058017][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 939.069559][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 939.081807][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 939.093766][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 939.105369][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 939.117674][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 939.129464][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 939.141861][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 01:42:57 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x6, 0x2000000000) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003dc0)={0x0, @loopback}, &(0x7f0000003e00)=0xc) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000003e40)={@loopback, r2}, 0x14) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000400)={&(0x7f0000000200)=@ll={0x11, 0x0, 0x0}, 0x389, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/19, 0x280}, {0xffffffffffffffff, 0x17e}, {&(0x7f00000002c0)=""/217, 0x22d}], 0x3, 0x0, 0x20, 0x5}, 0x21) connect$inet6(r1, &(0x7f0000000900)={0xa, 0x4e24, 0x0, @mcast1, 0x3}, 0xa) pipe(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000800)={r4}) getsockopt$bt_BT_RCVMTU(r5, 0x112, 0xd, &(0x7f0000000c00)=0x2, &(0x7f00000006c0)=0x2) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000880), &(0x7f0000000940)=0xffffffffffffffac) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='rdma.current\x00', 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r6, 0x119, 0x1, &(0x7f00000005c0), 0x3a1) setsockopt$inet6_int(r1, 0x29, 0x4, &(0x7f0000000080)=0x4, 0x4) getsockname$inet6(r1, &(0x7f0000000580), &(0x7f0000000c80)=0x1c) sendmsg$IPVS_CMD_SET_DEST(r6, &(0x7f00000007c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000780)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) unshare(0x40000000) getsockopt$inet6_tcp_buf(r6, 0x6, 0x0, &(0x7f0000000a80)=""/83, &(0x7f0000000280)=0x53) r7 = socket$inet6(0xa, 0x3, 0x3a) socket$xdp(0x2c, 0x3, 0x0) socketpair(0x2, 0x80000, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) connect$packet(r8, &(0x7f0000000680)={0x11, 0xfd, r3, 0x1, 0x3, 0x6, @link_local}, 0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000440)=0x4) setsockopt$RDS_CANCEL_SENT_TO(r5, 0x114, 0x1, &(0x7f0000000700)={0x2, 0x4e23, @multicast2}, 0x10) sendmsg$IPVS_CMD_FLUSH(r6, &(0x7f00000010c0)={&(0x7f0000000d40)={0x10, 0x0, 0x0, 0x3ffe}, 0xc, &(0x7f0000000d80)={&(0x7f0000000480)=ANY=[@ANYBLOB="04006fbd709aeb5fa60d17bc343ec4bb0000414de85bca727087ec7239045dfc05ad29adf22ab3587f0000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x8011) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000840)={r4, r6, 0x0, 0x2}, 0x10) bind$rds(r7, &(0x7f0000000500)={0x2, 0x4e20, @remote}, 0x10) setsockopt$inet6_int(r7, 0x29, 0xc8, &(0x7f00000004c0)=0x1, 0x38e) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000600)={0x1, 0x1, 0x7, 0x4}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r7, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x1, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @local}}, 0x5c) 01:42:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000300)=@updsa={0x140, 0x1a, 0x21, 0x0, 0x0, {{@in6=@loopback, @in=@remote}, {@in6=@loopback, 0x0, 0x6c}, @in=@remote, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}, @extra_flags={0x8}]}, 0x140}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") [ 941.579748][T13889] IPVS: ftp: loaded support on port[0] = 21 01:42:58 executing program 1: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffee1, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x66, 0x0, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000001240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, 0x0, 0x0, &(0x7f00000013c0)=""/70, 0x46}, 0x40010000) setsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, &(0x7f0000001480)=0x4a, 0x4) r4 = socket(0x0, 0x800, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000040)=ANY=[@ANYBLOB="fbe7ff00", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0) clock_gettime(0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) listen(r1, 0xfffffffffffffffb) ppoll(&(0x7f0000000340)=[{0xffffffffffffffff, 0x8}], 0x1, 0x0, &(0x7f0000000400), 0x8) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f00000000c0)=ANY=[@ANYBLOB="ac141420fffff8ff00ac1414aae000000000000000000000000000000000"], 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000b80)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r3, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[], 0x0) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000180)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, 0x0, 0x0, [{}]}, 0x88) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ppoll(&(0x7f0000000500)=[{r1, 0x2103}], 0xc, &(0x7f0000000580)={0x0, r2+10000000}, &(0x7f00000005c0), 0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000600)={0x0, @in6={{0xa, 0x4e20, 0xd57, @loopback}}}, 0x0) [ 944.048943][ C0] net_ratelimit: 13736 callbacks suppressed [ 944.048960][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 944.049053][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 944.055537][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 944.067119][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 944.079576][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 944.091073][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 944.103710][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 944.115093][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 944.127550][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 944.139021][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 949.059547][ C1] net_ratelimit: 17440 callbacks suppressed [ 949.059564][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 949.077914][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 949.079083][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 949.090237][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 949.102319][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 949.114654][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 949.126603][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 949.138409][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 949.151020][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 949.162521][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 954.068926][ C1] net_ratelimit: 19588 callbacks suppressed [ 954.068941][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 954.068983][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 954.075805][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 954.092128][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 954.099328][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 954.111682][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 954.123190][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 954.135582][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 954.147298][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 954.159465][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 959.089227][ C0] net_ratelimit: 19253 callbacks suppressed [ 959.089243][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 959.089360][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 959.096700][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 959.108509][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 959.120897][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 959.132547][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 959.144757][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 959.156574][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 959.168959][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 959.182164][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) 01:43:17 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x6, 0x2000000000) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003dc0)={0x0, @loopback}, &(0x7f0000003e00)=0xc) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000003e40)={@loopback, r2}, 0x14) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000400)={&(0x7f0000000200)=@ll={0x11, 0x0, 0x0}, 0x389, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/19, 0x280}, {0xffffffffffffffff, 0x17e}, {&(0x7f00000002c0)=""/217, 0x22d}], 0x3, 0x0, 0x20, 0x5}, 0x21) connect$inet6(r1, &(0x7f0000000900)={0xa, 0x4e24, 0x0, @mcast1, 0x3}, 0xa) pipe(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000800)={r4}) getsockopt$bt_BT_RCVMTU(r5, 0x112, 0xd, &(0x7f0000000c00)=0x2, &(0x7f00000006c0)=0x2) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000880), &(0x7f0000000940)=0xffffffffffffffac) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='rdma.current\x00', 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r6, 0x119, 0x1, &(0x7f00000005c0), 0x3a1) setsockopt$inet6_int(r1, 0x29, 0x4, &(0x7f0000000080)=0x4, 0x4) getsockname$inet6(r1, &(0x7f0000000580), &(0x7f0000000c80)=0x1c) sendmsg$IPVS_CMD_SET_DEST(r6, &(0x7f00000007c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000780)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) unshare(0x40000000) getsockopt$inet6_tcp_buf(r6, 0x6, 0x0, &(0x7f0000000a80)=""/83, &(0x7f0000000280)=0x53) r7 = socket$inet6(0xa, 0x3, 0x3a) socket$xdp(0x2c, 0x3, 0x0) socketpair(0x2, 0x80000, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) connect$packet(r8, &(0x7f0000000680)={0x11, 0xfd, r3, 0x1, 0x3, 0x6, @link_local}, 0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000440)=0x4) setsockopt$RDS_CANCEL_SENT_TO(r5, 0x114, 0x1, &(0x7f0000000700)={0x2, 0x4e23, @multicast2}, 0x10) sendmsg$IPVS_CMD_FLUSH(r6, &(0x7f00000010c0)={&(0x7f0000000d40)={0x10, 0x0, 0x0, 0x3ffe}, 0xc, &(0x7f0000000d80)={&(0x7f0000000480)=ANY=[@ANYBLOB="04006fbd709aeb5fa60d17bc343ec4bb0000414de85bca727087ec7239045dfc05ad29adf22ab3587f0000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x8011) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000840)={r4, r6, 0x0, 0x2}, 0x10) bind$rds(r7, &(0x7f0000000500)={0x2, 0x4e20, @remote}, 0x10) setsockopt$inet6_int(r7, 0x29, 0xc8, &(0x7f00000004c0)=0x1, 0x38e) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000600)={0x1, 0x1, 0x7, 0x4}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r7, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x1, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @local}}, 0x5c) 01:43:17 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x6, 0x2000000000) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003dc0)={0x0, @loopback}, &(0x7f0000003e00)=0xc) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000003e40)={@loopback, r2}, 0x14) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000400)={&(0x7f0000000200)=@ll={0x11, 0x0, 0x0}, 0x389, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/19, 0x280}, {0xffffffffffffffff, 0x17e}, {&(0x7f00000002c0)=""/217, 0x22d}], 0x3, 0x0, 0x20, 0x5}, 0x21) connect$inet6(r1, &(0x7f0000000900)={0xa, 0x4e24, 0x0, @mcast1, 0x3}, 0xa) pipe(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000800)={r4}) getsockopt$bt_BT_RCVMTU(r5, 0x112, 0xd, &(0x7f0000000c00)=0x2, &(0x7f00000006c0)=0x2) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000880), &(0x7f0000000940)=0xffffffffffffffac) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='rdma.current\x00', 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r6, 0x119, 0x1, &(0x7f00000005c0), 0x3a1) setsockopt$inet6_int(r1, 0x29, 0x4, &(0x7f0000000080)=0x4, 0x4) getsockname$inet6(r1, &(0x7f0000000580), &(0x7f0000000c80)=0x1c) sendmsg$IPVS_CMD_SET_DEST(r6, &(0x7f00000007c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000780)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) unshare(0x40000000) getsockopt$inet6_tcp_buf(r6, 0x6, 0x0, &(0x7f0000000a80)=""/83, &(0x7f0000000280)=0x53) r7 = socket$inet6(0xa, 0x3, 0x3a) socket$xdp(0x2c, 0x3, 0x0) socketpair(0x2, 0x80000, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) connect$packet(r8, &(0x7f0000000680)={0x11, 0xfd, r3, 0x1, 0x3, 0x6, @link_local}, 0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000440)=0x4) setsockopt$RDS_CANCEL_SENT_TO(r5, 0x114, 0x1, &(0x7f0000000700)={0x2, 0x4e23, @multicast2}, 0x10) sendmsg$IPVS_CMD_FLUSH(r6, &(0x7f00000010c0)={&(0x7f0000000d40)={0x10, 0x0, 0x0, 0x3ffe}, 0xc, &(0x7f0000000d80)={&(0x7f0000000480)=ANY=[@ANYBLOB="04006fbd709aeb5fa60d17bc343ec4bb0000414de85bca727087ec7239045dfc05ad29adf22ab3587f0000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x8011) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000840)={r4, r6, 0x0, 0x2}, 0x10) bind$rds(r7, &(0x7f0000000500)={0x2, 0x4e20, @remote}, 0x10) setsockopt$inet6_int(r7, 0x29, 0xc8, &(0x7f00000004c0)=0x1, 0x38e) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000600)={0x1, 0x1, 0x7, 0x4}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r7, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x1, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @local}}, 0x5c) 01:43:17 executing program 1: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffee1, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x66, 0x0, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000001240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, 0x0, 0x0, &(0x7f00000013c0)=""/70, 0x46}, 0x40010000) setsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, &(0x7f0000001480)=0x4a, 0x4) r4 = socket(0x0, 0x800, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000040)=ANY=[@ANYBLOB="fbe7ff00", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0) clock_gettime(0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) listen(r1, 0xfffffffffffffffb) ppoll(&(0x7f0000000340)=[{0xffffffffffffffff, 0x8}], 0x1, 0x0, &(0x7f0000000400), 0x8) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f00000000c0)=ANY=[@ANYBLOB="ac141420fffff8ff00ac1414aae000000000000000000000000000000000"], 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000b80)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r3, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[], 0x0) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000180)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, 0x0, 0x0, [{}]}, 0x88) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ppoll(&(0x7f0000000500)=[{r1, 0x2103}], 0xc, &(0x7f0000000580)={0x0, r2+10000000}, &(0x7f00000005c0), 0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000600)={0x0, @in6={{0xa, 0x4e20, 0xd57, @loopback}}}, 0x0) 01:43:17 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x6, 0x2000000000) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003dc0)={0x0, @loopback}, &(0x7f0000003e00)=0xc) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000003e40)={@loopback, r2}, 0x14) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000400)={&(0x7f0000000200)=@ll={0x11, 0x0, 0x0}, 0x389, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/19, 0x280}, {0xffffffffffffffff, 0x17e}, {&(0x7f00000002c0)=""/217, 0x22d}], 0x3, 0x0, 0x20, 0x5}, 0x21) connect$inet6(r1, &(0x7f0000000900)={0xa, 0x4e24, 0x0, @mcast1, 0x3}, 0xa) pipe(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000800)={r4}) getsockopt$bt_BT_RCVMTU(r5, 0x112, 0xd, &(0x7f0000000c00)=0x2, &(0x7f00000006c0)=0x2) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000880), &(0x7f0000000940)=0xffffffffffffffac) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='rdma.current\x00', 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r6, 0x119, 0x1, &(0x7f00000005c0), 0x3a1) setsockopt$inet6_int(r1, 0x29, 0x4, &(0x7f0000000080)=0x4, 0x4) getsockname$inet6(r1, &(0x7f0000000580), &(0x7f0000000c80)=0x1c) sendmsg$IPVS_CMD_SET_DEST(r6, &(0x7f00000007c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000780)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) unshare(0x40000000) getsockopt$inet6_tcp_buf(r6, 0x6, 0x0, &(0x7f0000000a80)=""/83, &(0x7f0000000280)=0x53) r7 = socket$inet6(0xa, 0x3, 0x3a) socket$xdp(0x2c, 0x3, 0x0) socketpair(0x2, 0x80000, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) connect$packet(r8, &(0x7f0000000680)={0x11, 0xfd, r3, 0x1, 0x3, 0x6, @link_local}, 0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000440)=0x4) setsockopt$RDS_CANCEL_SENT_TO(r5, 0x114, 0x1, &(0x7f0000000700)={0x2, 0x4e23, @multicast2}, 0x10) sendmsg$IPVS_CMD_FLUSH(r6, &(0x7f00000010c0)={&(0x7f0000000d40)={0x10, 0x0, 0x0, 0x3ffe}, 0xc, &(0x7f0000000d80)={&(0x7f0000000480)=ANY=[@ANYBLOB="04006fbd709aeb5fa60d17bc343ec4bb0000414de85bca727087ec7239045dfc05ad29adf22ab3587f0000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x8011) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000840)={r4, r6, 0x0, 0x2}, 0x10) bind$rds(r7, &(0x7f0000000500)={0x2, 0x4e20, @remote}, 0x10) setsockopt$inet6_int(r7, 0x29, 0xc8, &(0x7f00000004c0)=0x1, 0x38e) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000600)={0x1, 0x1, 0x7, 0x4}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r7, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x1, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @local}}, 0x5c) 01:43:17 executing program 2: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffee1, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x66, 0x0, 0x0) r3 = socket(0x0, 0x800, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0) clock_gettime(0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) listen(r1, 0xfffffffffffffffb) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r4, 0x820, 0x0, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x8d4}, 0x20000000) ppoll(&(0x7f0000000340)=[{0xffffffffffffffff, 0x8}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000b80)='IPVS\x00') setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r4, 0x600, 0x70bd2d, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x840) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000180)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, 0x0, 0x0, [{}]}, 0x88) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) ppoll(&(0x7f0000000500)=[{r1, 0x2103}], 0xc, &(0x7f0000000580)={0x0, r2+10000000}, &(0x7f00000005c0), 0x8) 01:43:17 executing program 0: socket$vsock_stream(0x28, 0x1, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000a8000)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) [ 961.580606][T13918] IPVS: ftp: loaded support on port[0] = 21 01:43:17 executing program 0: socket$vsock_stream(0x28, 0x1, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000a8000)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) [ 961.623599][T13927] IPVS: ftp: loaded support on port[0] = 21 [ 961.647139][T13933] IPVS: ftp: loaded support on port[0] = 21 01:43:18 executing program 0: socket$vsock_stream(0x28, 0x1, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000a8000)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 01:43:18 executing program 0: socket$vsock_stream(0x28, 0x1, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000a8000)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 01:43:18 executing program 0: socket(0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet(0x10, 0x3, 0x6) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 962.423719][T13966] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 963.196154][T13971] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 01:43:19 executing program 0: socket(0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet(0x10, 0x3, 0x6) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 963.854779][T13976] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 01:43:20 executing program 0: socket(0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet(0x10, 0x3, 0x6) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 964.099078][ C0] net_ratelimit: 12762 callbacks suppressed [ 964.099093][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 964.117825][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 964.125597][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 964.131140][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 964.142921][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 964.167036][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 964.179703][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 964.192057][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 964.204478][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 964.215528][T13980] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 964.217140][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 01:43:21 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x6, 0x2000000000) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003dc0)={0x0, @loopback}, &(0x7f0000003e00)=0xc) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000003e40)={@loopback, r2}, 0x14) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000400)={&(0x7f0000000200)=@ll={0x11, 0x0, 0x0}, 0x389, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/19, 0x280}, {0xffffffffffffffff, 0x17e}, {&(0x7f00000002c0)=""/217, 0x22d}], 0x3, 0x0, 0x20, 0x5}, 0x21) connect$inet6(r1, &(0x7f0000000900)={0xa, 0x4e24, 0x0, @mcast1, 0x3}, 0xa) pipe(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000800)={r4}) getsockopt$bt_BT_RCVMTU(r5, 0x112, 0xd, &(0x7f0000000c00)=0x2, &(0x7f00000006c0)=0x2) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000880), &(0x7f0000000940)=0xffffffffffffffac) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='rdma.current\x00', 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r6, 0x119, 0x1, &(0x7f00000005c0), 0x3a1) setsockopt$inet6_int(r1, 0x29, 0x4, &(0x7f0000000080)=0x4, 0x4) getsockname$inet6(r1, &(0x7f0000000580), &(0x7f0000000c80)=0x1c) sendmsg$IPVS_CMD_SET_DEST(r6, &(0x7f00000007c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000780)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) unshare(0x40000000) getsockopt$inet6_tcp_buf(r6, 0x6, 0x0, &(0x7f0000000a80)=""/83, &(0x7f0000000280)=0x53) r7 = socket$inet6(0xa, 0x3, 0x3a) socket$xdp(0x2c, 0x3, 0x0) socketpair(0x2, 0x80000, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) connect$packet(r8, &(0x7f0000000680)={0x11, 0xfd, r3, 0x1, 0x3, 0x6, @link_local}, 0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000440)=0x4) setsockopt$RDS_CANCEL_SENT_TO(r5, 0x114, 0x1, &(0x7f0000000700)={0x2, 0x4e23, @multicast2}, 0x10) sendmsg$IPVS_CMD_FLUSH(r6, &(0x7f00000010c0)={&(0x7f0000000d40)={0x10, 0x0, 0x0, 0x3ffe}, 0xc, &(0x7f0000000d80)={&(0x7f0000000480)=ANY=[@ANYBLOB="04006fbd709aeb5fa60d17bc343ec4bb0000414de85bca727087ec7239045dfc05ad29adf22ab3587f0000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x8011) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000840)={r4, r6, 0x0, 0x2}, 0x10) bind$rds(r7, &(0x7f0000000500)={0x2, 0x4e20, @remote}, 0x10) setsockopt$inet6_int(r7, 0x29, 0xc8, &(0x7f00000004c0)=0x1, 0x38e) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000600)={0x1, 0x1, 0x7, 0x4}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r7, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x1, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @local}}, 0x5c) [ 965.109104][T13985] IPVS: ftp: loaded support on port[0] = 21 [ 969.109262][ C1] net_ratelimit: 13279 callbacks suppressed [ 969.109278][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 969.109363][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 969.115469][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 969.128016][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 969.139529][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 969.152000][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 969.164048][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 969.176380][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 969.187981][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 969.200349][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 974.118869][ C0] net_ratelimit: 19895 callbacks suppressed [ 974.118883][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 974.119285][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 974.125400][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 974.137002][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 974.149412][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 974.160919][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 974.173212][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 974.185022][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 974.196836][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 974.208645][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) 01:43:32 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x6, 0x2000000000) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003dc0)={0x0, @loopback}, &(0x7f0000003e00)=0xc) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000003e40)={@loopback, r2}, 0x14) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000400)={&(0x7f0000000200)=@ll={0x11, 0x0, 0x0}, 0x389, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/19, 0x280}, {0xffffffffffffffff, 0x17e}, {&(0x7f00000002c0)=""/217, 0x22d}], 0x3, 0x0, 0x20, 0x5}, 0x21) connect$inet6(r1, &(0x7f0000000900)={0xa, 0x4e24, 0x0, @mcast1, 0x3}, 0xa) pipe(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000800)={r4}) getsockopt$bt_BT_RCVMTU(r5, 0x112, 0xd, &(0x7f0000000c00)=0x2, &(0x7f00000006c0)=0x2) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000880), &(0x7f0000000940)=0xffffffffffffffac) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='rdma.current\x00', 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r6, 0x119, 0x1, &(0x7f00000005c0), 0x3a1) setsockopt$inet6_int(r1, 0x29, 0x4, &(0x7f0000000080)=0x4, 0x4) getsockname$inet6(r1, &(0x7f0000000580), &(0x7f0000000c80)=0x1c) sendmsg$IPVS_CMD_SET_DEST(r6, &(0x7f00000007c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000780)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) unshare(0x40000000) getsockopt$inet6_tcp_buf(r6, 0x6, 0x0, &(0x7f0000000a80)=""/83, &(0x7f0000000280)=0x53) r7 = socket$inet6(0xa, 0x3, 0x3a) socket$xdp(0x2c, 0x3, 0x0) socketpair(0x2, 0x80000, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) connect$packet(r8, &(0x7f0000000680)={0x11, 0xfd, r3, 0x1, 0x3, 0x6, @link_local}, 0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000440)=0x4) setsockopt$RDS_CANCEL_SENT_TO(r5, 0x114, 0x1, &(0x7f0000000700)={0x2, 0x4e23, @multicast2}, 0x10) sendmsg$IPVS_CMD_FLUSH(r6, &(0x7f00000010c0)={&(0x7f0000000d40)={0x10, 0x0, 0x0, 0x3ffe}, 0xc, &(0x7f0000000d80)={&(0x7f0000000480)=ANY=[@ANYBLOB="04006fbd709aeb5fa60d17bc343ec4bb0000414de85bca727087ec7239045dfc05ad29adf22ab3587f0000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x8011) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000840)={r4, r6, 0x0, 0x2}, 0x10) bind$rds(r7, &(0x7f0000000500)={0x2, 0x4e20, @remote}, 0x10) setsockopt$inet6_int(r7, 0x29, 0xc8, &(0x7f00000004c0)=0x1, 0x38e) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000600)={0x1, 0x1, 0x7, 0x4}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r7, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x1, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @local}}, 0x5c) 01:43:32 executing program 0: socket(0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet(0x10, 0x3, 0x6) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 01:43:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) recvmsg(r1, &(0x7f0000006e40)={&(0x7f0000005a80)=@hci, 0x80, &(0x7f0000006d00)=[{&(0x7f0000005d00)=""/4096, 0x1000}], 0x1, &(0x7f0000006d40)=""/235, 0xeb}, 0x0) 01:43:32 executing program 1: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffee1, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x66, 0x0, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000001240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, 0x0, 0x0, &(0x7f00000013c0)=""/70, 0x46}, 0x40010000) setsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, &(0x7f0000001480)=0x4a, 0x4) r4 = socket(0x0, 0x800, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000040)=ANY=[@ANYBLOB="fbe7ff00", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0) clock_gettime(0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) listen(r1, 0xfffffffffffffffb) ppoll(&(0x7f0000000340)=[{0xffffffffffffffff, 0x8}], 0x1, 0x0, &(0x7f0000000400), 0x8) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f00000000c0)=ANY=[@ANYBLOB="ac141420fffff8ff00ac1414aae000000000000000000000000000000000"], 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000b80)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r3, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[], 0x0) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000180)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, 0x0, 0x0, [{}]}, 0x88) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ppoll(&(0x7f0000000500)=[{r1, 0x2103}], 0xc, &(0x7f0000000580)={0x0, r2+10000000}, &(0x7f00000005c0), 0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000600)={0x0, @in6={{0xa, 0x4e20, 0xd57, @loopback}}}, 0x0) 01:43:32 executing program 2: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffee1, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x66, 0x0, 0x0) r3 = socket(0x0, 0x800, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0) clock_gettime(0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) listen(r1, 0xfffffffffffffffb) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r4, 0x820, 0x0, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x8d4}, 0x20000000) ppoll(&(0x7f0000000340)=[{0xffffffffffffffff, 0x8}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000b80)='IPVS\x00') setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r4, 0x600, 0x70bd2d, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x840) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000180)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, 0x0, 0x0, [{}]}, 0x88) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) ppoll(&(0x7f0000000500)=[{r1, 0x2103}], 0xc, &(0x7f0000000580)={0x0, r2+10000000}, &(0x7f00000005c0), 0x8) 01:43:32 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x6, 0x2000000000) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003dc0)={0x0, @loopback}, &(0x7f0000003e00)=0xc) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000003e40)={@loopback, r2}, 0x14) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000400)={&(0x7f0000000200)=@ll={0x11, 0x0, 0x0}, 0x389, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/19, 0x280}, {0xffffffffffffffff, 0x17e}, {&(0x7f00000002c0)=""/217, 0x22d}], 0x3, 0x0, 0x20, 0x5}, 0x21) connect$inet6(r1, &(0x7f0000000900)={0xa, 0x4e24, 0x0, @mcast1, 0x3}, 0xa) pipe(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000800)={r4}) getsockopt$bt_BT_RCVMTU(r5, 0x112, 0xd, &(0x7f0000000c00)=0x2, &(0x7f00000006c0)=0x2) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000880), &(0x7f0000000940)=0xffffffffffffffac) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='rdma.current\x00', 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r6, 0x119, 0x1, &(0x7f00000005c0), 0x3a1) setsockopt$inet6_int(r1, 0x29, 0x4, &(0x7f0000000080)=0x4, 0x4) getsockname$inet6(r1, &(0x7f0000000580), &(0x7f0000000c80)=0x1c) sendmsg$IPVS_CMD_SET_DEST(r6, &(0x7f00000007c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000780)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) unshare(0x40000000) getsockopt$inet6_tcp_buf(r6, 0x6, 0x0, &(0x7f0000000a80)=""/83, &(0x7f0000000280)=0x53) r7 = socket$inet6(0xa, 0x3, 0x3a) socket$xdp(0x2c, 0x3, 0x0) socketpair(0x2, 0x80000, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) connect$packet(r8, &(0x7f0000000680)={0x11, 0xfd, r3, 0x1, 0x3, 0x6, @link_local}, 0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000440)=0x4) setsockopt$RDS_CANCEL_SENT_TO(r5, 0x114, 0x1, &(0x7f0000000700)={0x2, 0x4e23, @multicast2}, 0x10) sendmsg$IPVS_CMD_FLUSH(r6, &(0x7f00000010c0)={&(0x7f0000000d40)={0x10, 0x0, 0x0, 0x3ffe}, 0xc, &(0x7f0000000d80)={&(0x7f0000000480)=ANY=[@ANYBLOB="04006fbd709aeb5fa60d17bc343ec4bb0000414de85bca727087ec7239045dfc05ad29adf22ab3587f0000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x8011) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000840)={r4, r6, 0x0, 0x2}, 0x10) bind$rds(r7, &(0x7f0000000500)={0x2, 0x4e20, @remote}, 0x10) setsockopt$inet6_int(r7, 0x29, 0xc8, &(0x7f00000004c0)=0x1, 0x38e) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000600)={0x1, 0x1, 0x7, 0x4}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r7, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x1, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @local}}, 0x5c) 01:43:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1000000000000001, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0xa}, 0x1c) sendto$inet6(r0, &(0x7f00000002c0)='W', 0x1, 0x40844, 0x0, 0x0) [ 976.398112][T14003] IPVS: ftp: loaded support on port[0] = 21 [ 976.429567][T14011] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 976.468482][T14008] IPVS: ftp: loaded support on port[0] = 21 01:43:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = socket$kcm(0x10, 0x800000000002, 0x0) recvmsg$kcm(r1, &(0x7f0000002c00)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="160000001a0081aee4050c00000f00fe078bc36f1600", 0x16}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) 01:43:32 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='/\xa89\x02S\xa8t1\xffUb,\xc84\x18\xcf\xdb\xcb_\xc9\xe3R\xbb\xe1f\xcbi`6\x16o5\x9b\xf9\xc8\xbe\xf0\x9a[\xa2 \x88xu\xa7\xd7k\nY.,{6\xdeb\xf3\bB\xf1\x9d\xef\xe8\xe6%\xee\x8d\x15NYq}<\xd21\xc7N\x8b\xf8\xbf\xb7#\x1e\xeb\xa6{;\xfb\xdb\xe58\x96\\w\xa8\x93\xf4\xed\xd5\xe7\b\x88^\xf2\xa4O\x99\xc6\x95\xcd#-\x8f\xfc\x05\xf0\xe1-}U\x17\xc1\xb5\xbbGN[\xaa`l[\xe0\x81\xf2+i1>\xd5\x9b\xdbv\xdf\x1b\xf9\xec\f\x1d\'\x8f\x9b\x1d\xc2|\xa3\xdd\x18\xec@\xe6\x87\x1d7S\x1b\xd8\\U\x06\xa8\xe9\x94\xac\xb6\x9d?\xaf\x84\xda\xdeaL\bME\xf7\xe6\x9eZ\x92\xe0\xd9?K\xe3H\xdc<><\xaf\xdd0U\x11\xdeXJ\a\xc4\xbc(\x98u\xc1\f\x83\xc6\xf7\"\xed\xf3\xab\x8e\x1d&\x1a\xd5Y\x05\xa2\xc9\xdc\xb5\x94\x84\x03\xebr\x89)\xf7\xd69\xdb\n\xe6\xaf\xd6]\xeaE\x8e\xb0\xb7\x01k\xc3\xa6\xb9\xbd', 0x200002, 0x0) 01:43:33 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) pwrite64(r0, 0x0, 0xfffffdec, 0x20000006) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f00000002c0)=""/185, &(0x7f00000003c0)=0xb9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x10076) syz_genetlink_get_family_id$ipvs(0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x2880008, r0, 0x0, 0x8, 0xe0ffffff}) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x10, 0xffffffffffffffff, 0x0) 01:43:33 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) r2 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) listen(r1, 0x0) 01:43:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(r1, &(0x7f00000000c0)={&(0x7f0000139ff0)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000140)="f2", 0x1}], 0x1}, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 979.129134][ C1] net_ratelimit: 14768 callbacks suppressed [ 979.129155][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 979.148137][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 979.157205][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 979.160446][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 979.172309][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 979.184245][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 979.196711][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 979.208963][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 979.220842][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 979.232774][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 984.139016][ C0] net_ratelimit: 15403 callbacks suppressed [ 984.139034][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 984.139047][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 984.139595][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 984.145623][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 984.157819][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 984.169653][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 984.181272][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 984.193487][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 984.205437][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 984.217309][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 989.148851][ C1] net_ratelimit: 21262 callbacks suppressed [ 989.148867][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 989.149056][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 989.157235][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 989.177029][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 989.179535][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 989.191382][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 989.203498][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 989.215174][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 989.226833][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 989.238950][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 994.159237][ C1] net_ratelimit: 17023 callbacks suppressed [ 994.159253][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 994.159288][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 994.165945][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 994.177944][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 994.189867][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:54:29:fa:c4:25, vlan:0) [ 994.202234][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 994.213731][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 994.225695][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 994.238005][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 994.249776][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 01:43:52 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) pwrite64(r0, 0x0, 0xfffffdec, 0x20000006) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f00000002c0)=""/185, &(0x7f00000003c0)=0xb9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x10076) syz_genetlink_get_family_id$ipvs(0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x2880008, r0, 0x0, 0x8, 0xe0ffffff}) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x10, 0xffffffffffffffff, 0x0) 01:43:52 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) pwrite64(r0, 0x0, 0xfffffdec, 0x20000006) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f00000002c0)=""/185, &(0x7f00000003c0)=0xb9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x10076) syz_genetlink_get_family_id$ipvs(0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x2880008, r0, 0x0, 0x8, 0xe0ffffff}) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x10, 0xffffffffffffffff, 0x0) 01:43:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(r1, &(0x7f00000000c0)={&(0x7f0000139ff0)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000140)="f2", 0x1}], 0x1}, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:43:52 executing program 1: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffee1, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x66, 0x0, 0x0) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000001240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, 0x0, 0x0, &(0x7f00000013c0)=""/70, 0x46}, 0x40010000) setsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, &(0x7f0000001480)=0x4a, 0x4) r4 = socket(0x0, 0x800, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000040)=ANY=[@ANYBLOB="fbe7ff00", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0) clock_gettime(0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) listen(r1, 0xfffffffffffffffb) ppoll(&(0x7f0000000340)=[{0xffffffffffffffff, 0x8}], 0x1, 0x0, &(0x7f0000000400), 0x8) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f00000000c0)=ANY=[@ANYBLOB="ac141420fffff8ff00ac1414aae000000000000000000000000000000000"], 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000b80)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r3, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[], 0x0) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000180)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, 0x0, 0x0, [{}]}, 0x88) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ppoll(&(0x7f0000000500)=[{r1, 0x2103}], 0xc, &(0x7f0000000580)={0x0, r2+10000000}, &(0x7f00000005c0), 0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000600)={0x0, @in6={{0xa, 0x4e20, 0xd57, @loopback}}}, 0x0) 01:43:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x1000007, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$bt_hci(r1, 0x0, 0xf, &(0x7f00000003c0)=""/4096, &(0x7f00000013c0)=0x2) 01:43:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x22000000002, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @remote}}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x6beae7b, 0x0) 01:43:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000004340)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000004500)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000004380)={0x50, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}]}]}, 0x50}}, 0x0) [ 997.017305][ T78] kasan: CONFIG_KASAN_INLINE enabled [ 997.024114][ T78] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 997.075529][ T78] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 997.082704][ T78] CPU: 0 PID: 78 Comm: kworker/u4:2 Not tainted 5.0.0+ #128 [ 997.089986][ T78] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 997.100125][ T78] Workqueue: netns cleanup_net [ 997.104994][ T78] RIP: 0010:gro_cells_destroy+0x19d/0x360 [ 997.110718][ T78] Code: 03 42 80 3c 20 00 0f 85 53 01 00 00 48 8d 7a 08 49 8b 47 08 49 c7 07 00 00 00 00 48 89 f9 49 c7 47 08 00 00 00 00 48 c1 e9 03 <42> 80 3c 21 00 0f 85 10 01 00 00 48 89 c1 48 89 42 08 48 c1 e9 03 [ 997.130326][ T78] RSP: 0018:ffff8880a9a0f9a8 EFLAGS: 00010202 [ 997.136406][ T78] RAX: 0000000000000000 RBX: ffffe8ffffd80000 RCX: 0000000000000001 [ 997.144394][ T78] RDX: 0000000000000000 RSI: ffffffff858aab9a RDI: 0000000000000008 [ 997.152458][ T78] RBP: ffff8880a9a0fa08 R08: ffff8880a9a02580 R09: fffffbfff1265255 [ 997.160452][ T78] R10: fffffbfff1265254 R11: ffffffff893292a3 R12: dffffc0000000000 [ 997.168431][ T78] R13: 0000000000000001 R14: ffffe8ffffd80010 R15: ffffe8ffffd8001e [ 997.176411][ T78] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 997.185342][ T78] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 997.191930][ T78] CR2: 0000000000a5048d CR3: 000000006c533000 CR4: 00000000001406f0 [ 997.199912][ T78] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 997.207891][ T78] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 997.215863][ T78] Call Trace: [ 997.219281][ T78] ? cpumask_next+0x41/0x50 [ 997.223886][ T78] ? ip_tunnel_init+0x440/0x440 [ 997.228751][ T78] ip_tunnel_dev_free+0x19/0x60 [ 997.233672][ T78] netdev_run_todo+0x51c/0x7d0 [ 997.238449][ T78] ? register_netdev+0x50/0x50 [ 997.243304][ T78] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 997.249559][ T78] ? net_set_todo+0xbf/0x150 [ 997.254158][ T78] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 997.260399][ T78] rtnl_unlock+0xe/0x10 [ 997.264559][ T78] ip_tunnel_delete_nets+0x423/0x5f0 [ 997.269855][ T78] ? ip_tunnel_update+0x9b0/0x9b0 [ 997.274884][ T78] ? ipip_get_size+0x10/0x10 [ 997.279475][ T78] ipip_exit_batch_net+0x23/0x30 [ 997.284476][ T78] ops_exit_list.isra.0+0x105/0x160 [ 997.289680][ T78] cleanup_net+0x3fb/0x960 [ 997.294102][ T78] ? netns_install+0x1d0/0x1d0 [ 997.298949][ T78] process_one_work+0x98e/0x1790 [ 997.303899][ T78] ? pwq_dec_nr_in_flight+0x320/0x320 [ 997.309303][ T78] ? lock_acquire+0x16f/0x3f0 [ 997.313994][ T78] worker_thread+0x98/0xe40 [ 997.318510][ T78] kthread+0x357/0x430 [ 997.322590][ T78] ? process_one_work+0x1790/0x1790 [ 997.327799][ T78] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 997.334124][ T78] ret_from_fork+0x3a/0x50 [ 997.338538][ T78] Modules linked in: [ 997.352065][T14097] IPVS: Unknown mcast interface: [ 997.373031][T14098] IPVS: Unknown mcast interface: 01:43:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x22000000002, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @remote}}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x6beae7b, 0x0) 01:43:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(r1, &(0x7f00000000c0)={&(0x7f0000139ff0)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000140)="f2", 0x1}], 0x1}, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 01:43:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000004340)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000004500)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000004380)={0x50, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}]}]}, 0x50}}, 0x0) [ 997.481327][ T3875] kobject: 'loop5' (000000004e2925cc): kobject_uevent_env [ 997.496393][ T3875] kobject: 'loop5' (000000004e2925cc): fill_kobj_path: path = '/devices/virtual/block/loop5' 01:43:53 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) pwrite64(r0, 0x0, 0xfffffdec, 0x20000006) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f00000002c0)=""/185, &(0x7f00000003c0)=0xb9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x10076) syz_genetlink_get_family_id$ipvs(0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x2880008, r0, 0x0, 0x8, 0xe0ffffff}) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x10, 0xffffffffffffffff, 0x0) 01:43:53 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) pwrite64(r0, 0x0, 0xfffffdec, 0x20000006) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f00000002c0)=""/185, &(0x7f00000003c0)=0xb9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x10076) syz_genetlink_get_family_id$ipvs(0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x2880008, r0, 0x0, 0x8, 0xe0ffffff}) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x10, 0xffffffffffffffff, 0x0) [ 997.575134][ T3875] kobject: 'loop4' (00000000c123f51d): kobject_uevent_env [ 997.591196][T14105] IPVS: Unknown mcast interface: [ 997.612397][ T3875] kobject: 'loop4' (00000000c123f51d): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 997.649139][ T3875] kobject: 'loop3' (00000000bf23a9d6): kobject_uevent_env 01:43:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000004340)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000004500)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000004380)={0x50, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}]}]}, 0x50}}, 0x0) [ 997.690769][ T3875] kobject: 'loop3' (00000000bf23a9d6): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 997.761544][T14110] IPVS: Unknown mcast interface: [ 997.769175][ T3875] kobject: 'loop3' (00000000bf23a9d6): kobject_uevent_env [ 997.814109][ T3875] kobject: 'loop3' (00000000bf23a9d6): fill_kobj_path: path = '/devices/virtual/block/loop3' 01:43:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000004340)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000004500)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000004380)={0x50, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}]}]}, 0x50}}, 0x0) [ 997.879338][ T3875] kobject: 'loop0' (00000000770676d2): kobject_uevent_env [ 997.932265][ T3875] kobject: 'loop0' (00000000770676d2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 997.955766][T14120] IPVS: Unknown mcast interface: [ 998.009224][ T3875] kobject: 'loop2' (000000007bb4c2bc): kobject_uevent_env [ 998.037205][ T3875] kobject: 'loop2' (000000007bb4c2bc): fill_kobj_path: path = '/devices/virtual/block/loop2' 01:43:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000004340)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000004500)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000004380)={0x50, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}]}]}, 0x50}}, 0x0) [ 998.202944][T14131] IPVS: Unknown mcast interface: [ 998.249727][ T3875] kobject: 'loop4' (00000000c123f51d): kobject_uevent_env [ 998.256917][ T3875] kobject: 'loop4' (00000000c123f51d): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 998.325176][ T3875] kobject: 'loop3' (00000000bf23a9d6): kobject_uevent_env [ 998.351732][ T3875] kobject: 'loop3' (00000000bf23a9d6): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 998.397428][ T3875] kobject: 'loop5' (000000004e2925cc): kobject_uevent_env [ 998.425429][ T3875] kobject: 'loop5' (000000004e2925cc): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 998.524495][ T78] ---[ end trace 28bc951873b1c368 ]--- [ 998.542134][ T78] RIP: 0010:gro_cells_destroy+0x19d/0x360 [ 998.557887][ T78] Code: 03 42 80 3c 20 00 0f 85 53 01 00 00 48 8d 7a 08 49 8b 47 08 49 c7 07 00 00 00 00 48 89 f9 49 c7 47 08 00 00 00 00 48 c1 e9 03 <42> 80 3c 21 00 0f 85 10 01 00 00 48 89 c1 48 89 42 08 48 c1 e9 03 [ 998.646865][ T78] RSP: 0018:ffff8880a9a0f9a8 EFLAGS: 00010202 [ 998.664685][ T78] RAX: 0000000000000000 RBX: ffffe8ffffd80000 RCX: 0000000000000001 [ 998.697964][ T78] RDX: 0000000000000000 RSI: ffffffff858aab9a RDI: 0000000000000008 [ 998.738848][ T78] RBP: ffff8880a9a0fa08 R08: ffff8880a9a02580 R09: fffffbfff1265255 [ 998.746873][ T78] R10: fffffbfff1265254 R11: ffffffff893292a3 R12: dffffc0000000000 [ 998.798756][ T78] R13: 0000000000000001 R14: ffffe8ffffd80010 R15: ffffe8ffffd8001e [ 998.840427][ T3875] kobject: 'loop0' (00000000770676d2): kobject_uevent_env [ 998.848637][ T3875] kobject: 'loop0' (00000000770676d2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 998.859285][ T78] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 998.902313][ T78] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 998.910415][ T78] CR2: 0000000000000000 CR3: 00000000a5b2f000 CR4: 00000000001406e0 [ 998.925091][ T78] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 998.966592][ T78] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 999.001412][ T78] Kernel panic - not syncing: Fatal exception [ 999.004841][ T3875] kobject: 'loop2' (000000007bb4c2bc): kobject_uevent_env [ 999.015725][ T78] Kernel Offset: disabled [ 999.020859][ T78] Rebooting in 86400 seconds..