[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 28.676537] kauditd_printk_skb: 7 callbacks suppressed [ 28.676550] audit: type=1800 audit(1544864967.345:29): pid=5886 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 28.702792] audit: type=1800 audit(1544864967.355:30): pid=5886 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 32.949266] sshd (6025) used greatest stack depth: 15744 bytes left Warning: Permanently added '10.128.0.162' (ECDSA) to the list of known hosts. 2018/12/15 09:09:38 fuzzer started 2018/12/15 09:09:41 dialing manager at 10.128.0.26:45113 2018/12/15 09:09:41 syscalls: 1 2018/12/15 09:09:41 code coverage: enabled 2018/12/15 09:09:41 comparison tracing: enabled 2018/12/15 09:09:41 setuid sandbox: enabled 2018/12/15 09:09:41 namespace sandbox: enabled 2018/12/15 09:09:41 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/15 09:09:41 fault injection: enabled 2018/12/15 09:09:41 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/15 09:09:41 net packet injection: enabled 2018/12/15 09:09:41 net device setup: enabled 09:10:37 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xffeffffff7ffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xf, &(0x7f0000000500)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, &(0x7f0000000480)=0x98) [ 99.411049] IPVS: ftp: loaded support on port[0] = 21 09:10:38 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x80) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @rand_addr=0x80000000}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 99.658113] IPVS: ftp: loaded support on port[0] = 21 09:10:38 executing program 2: write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) epoll_pwait(r0, &(0x7f00000000c0)=[{}, {}, {}], 0x3, 0x0, 0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r0, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x6, 0x10, 0xffffffffffffffff, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f00000003c0)={0x1f, 0x0, {0x2, 0x0, 0x4, 0x0, 0x7ff, 0x3}, 0x5, 0xffffffff}, 0xe) read(r0, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000300)=0x13, 0x4) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f0000000040)={0x20000003}) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x1, 0x4) mmap(&(0x7f0000f44000/0x4000)=nil, 0x507000, 0x1000007, 0x2013, r0, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000680), &(0x7f00000006c0)=0x4) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20004004}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4048040}, 0x10) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000200), 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, 0x0, 0x0) [ 99.982420] IPVS: ftp: loaded support on port[0] = 21 09:10:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x2039648f) [ 100.519845] IPVS: ftp: loaded support on port[0] = 21 09:10:39 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000000004, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x5, &(0x7f00000000c0)=""/25, &(0x7f0000000340)=0x19) [ 100.994732] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.020591] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.030088] device bridge_slave_0 entered promiscuous mode [ 101.143676] IPVS: ftp: loaded support on port[0] = 21 [ 101.189732] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.209862] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.224376] device bridge_slave_1 entered promiscuous mode [ 101.350436] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 101.480445] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 101.495442] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.530746] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.538091] device bridge_slave_0 entered promiscuous mode 09:10:40 executing program 5: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x4, &(0x7f0000000180), 0x1) [ 101.679800] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.695032] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.711490] device bridge_slave_1 entered promiscuous mode [ 101.800231] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.806686] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.826134] device bridge_slave_0 entered promiscuous mode [ 101.843817] IPVS: ftp: loaded support on port[0] = 21 [ 101.865189] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 101.944438] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 101.958822] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.972040] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.990649] device bridge_slave_1 entered promiscuous mode [ 102.022740] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 102.061310] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 102.086578] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 102.253015] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 102.395613] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 102.518752] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 102.676782] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 102.691956] team0: Port device team_slave_0 added [ 102.732610] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 102.743905] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.758403] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.766639] device bridge_slave_0 entered promiscuous mode [ 102.791334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 102.822529] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 102.835871] team0: Port device team_slave_1 added [ 102.842731] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 102.858846] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.870325] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.885497] device bridge_slave_1 entered promiscuous mode [ 102.894323] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 102.948631] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 102.972275] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 102.980967] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 102.990790] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 103.104617] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 103.151374] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 103.234530] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 103.270342] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 103.278328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 103.351824] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 103.361986] team0: Port device team_slave_0 added [ 103.406317] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 103.428235] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 103.443999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 103.501745] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.512780] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.520591] device bridge_slave_0 entered promiscuous mode [ 103.531999] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 103.539362] team0: Port device team_slave_1 added [ 103.613240] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 103.690102] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 103.697485] team0: Port device team_slave_0 added [ 103.714029] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 103.732083] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.738449] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.748327] device bridge_slave_1 entered promiscuous mode [ 103.774040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 103.787969] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 103.801934] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 103.812649] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 103.821718] team0: Port device team_slave_1 added [ 103.829092] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 103.850932] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 103.892425] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 103.902914] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 103.946106] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 103.960254] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 103.977676] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 103.988033] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 104.011185] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 104.032396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 104.050880] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 104.088703] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 104.105630] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 104.129440] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 104.149590] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 104.182503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 104.205044] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 104.251508] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 104.258649] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.290199] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.297609] device bridge_slave_0 entered promiscuous mode [ 104.308905] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 104.326883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 104.376552] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 104.401435] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 104.431261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 104.439251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 104.470963] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.477333] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.484953] device bridge_slave_1 entered promiscuous mode [ 104.513037] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 104.535892] team0: Port device team_slave_0 added [ 104.548573] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 104.620509] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 104.655878] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 104.672571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 104.732761] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 104.750390] team0: Port device team_slave_1 added [ 104.783375] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 104.831551] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 104.838413] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 104.878989] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 104.887946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 104.900929] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 105.004635] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 105.019917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 105.040995] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 105.062454] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.068927] bridge0: port 2(bridge_slave_1) entered forwarding state [ 105.075965] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.082386] bridge0: port 1(bridge_slave_0) entered forwarding state [ 105.089923] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 105.144055] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 105.180843] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 105.190842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 105.261776] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 105.283375] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 105.310993] team0: Port device team_slave_0 added [ 105.318432] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 105.340782] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 105.354686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 105.374322] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 105.403603] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 105.431135] team0: Port device team_slave_1 added [ 105.437201] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 105.526501] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 105.547875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 105.558951] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 105.582717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 105.592467] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 105.617929] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.624355] bridge0: port 2(bridge_slave_1) entered forwarding state [ 105.631051] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.637456] bridge0: port 1(bridge_slave_0) entered forwarding state [ 105.666478] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 105.683690] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 105.693213] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 105.711252] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 105.720841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 105.750603] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 105.890383] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 105.897662] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 105.912872] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 105.948903] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.955331] bridge0: port 2(bridge_slave_1) entered forwarding state [ 105.962030] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.968425] bridge0: port 1(bridge_slave_0) entered forwarding state [ 105.981846] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 106.028515] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 106.061656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 106.080552] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 106.191790] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 106.214471] team0: Port device team_slave_0 added [ 106.390393] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 106.414034] team0: Port device team_slave_1 added [ 106.440202] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 106.456083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 106.539734] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 106.561103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 106.579532] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 106.690340] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 106.697212] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 106.710730] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 106.744905] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.751313] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.757966] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.764393] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.796287] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 106.829557] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 106.851634] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 106.887450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 106.992296] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 106.999417] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 107.013637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 107.416587] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.423027] bridge0: port 2(bridge_slave_1) entered forwarding state [ 107.429700] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.436150] bridge0: port 1(bridge_slave_0) entered forwarding state [ 107.466596] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 107.479332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 107.487245] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 108.411264] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.417769] bridge0: port 2(bridge_slave_1) entered forwarding state [ 108.424490] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.430910] bridge0: port 1(bridge_slave_0) entered forwarding state [ 108.459239] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 108.482937] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 110.340411] 8021q: adding VLAN 0 to HW filter on device bond0 [ 110.685885] 8021q: adding VLAN 0 to HW filter on device bond0 [ 110.824203] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 111.110811] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 111.305225] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 111.312433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 111.320398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 111.347339] 8021q: adding VLAN 0 to HW filter on device bond0 [ 111.521363] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 111.527527] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 111.542862] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 111.841419] 8021q: adding VLAN 0 to HW filter on device team0 [ 111.870434] 8021q: adding VLAN 0 to HW filter on device bond0 [ 111.879561] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 112.012383] 8021q: adding VLAN 0 to HW filter on device team0 [ 112.326523] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 112.351236] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 112.366489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 112.377809] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 112.410979] 8021q: adding VLAN 0 to HW filter on device bond0 [ 112.819494] 8021q: adding VLAN 0 to HW filter on device team0 [ 112.862826] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 112.873157] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 112.886053] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 112.910546] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 113.311600] 8021q: adding VLAN 0 to HW filter on device team0 [ 113.325315] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 113.342044] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 113.356521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 113.611887] 8021q: adding VLAN 0 to HW filter on device bond0 [ 113.930786] 8021q: adding VLAN 0 to HW filter on device team0 [ 114.031832] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 114.526800] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 114.547224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 114.557874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 09:10:53 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xffeffffff7ffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xf, &(0x7f0000000500)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, &(0x7f0000000480)=0x98) [ 114.887901] 8021q: adding VLAN 0 to HW filter on device team0 09:10:53 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg(r1, &(0x7f0000000040)={&(0x7f0000000280)=@in={0x2, 0x4e22}, 0x80, 0x0, 0x0, &(0x7f0000000340)=[{0x38, 0x0, 0x7, "44240f0500013c14eda95340ed7ed5c9e82fc03e83481540fecc30356e9c19e16c"}], 0x38}, 0x0) 09:10:53 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xffeffffff7ffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xf, &(0x7f0000000500)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, &(0x7f0000000480)=0x98) 09:10:53 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg(r1, &(0x7f0000000040)={&(0x7f0000000280)=@in={0x2, 0x4e22}, 0x80, 0x0, 0x0, &(0x7f0000000340)=[{0x38, 0x0, 0x7, "44240f0500013c14eda95340ed7ed5c9e82fc03e83481540fecc30356e9c19e16c"}], 0x38}, 0x0) 09:10:53 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xffeffffff7ffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xf, &(0x7f0000000500)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, &(0x7f0000000480)=0x98) 09:10:53 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg(r1, &(0x7f0000000040)={&(0x7f0000000280)=@in={0x2, 0x4e22}, 0x80, 0x0, 0x0, &(0x7f0000000340)=[{0x38, 0x0, 0x7, "44240f0500013c14eda95340ed7ed5c9e82fc03e83481540fecc30356e9c19e16c"}], 0x38}, 0x0) 09:10:54 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg(r1, &(0x7f0000000040)={&(0x7f0000000280)=@in={0x2, 0x4e22}, 0x80, 0x0, 0x0, &(0x7f0000000340)=[{0x38, 0x0, 0x7, "44240f0500013c14eda95340ed7ed5c9e82fc03e83481540fecc30356e9c19e16c"}], 0x38}, 0x0) 09:10:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x7) getsockopt$netlink(r0, 0x10e, 0xa, &(0x7f0000000000)=""/109, &(0x7f00000000c0)=0x6d) socket$inet6(0xa, 0x1000000000006, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 09:10:55 executing program 2: write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) epoll_pwait(r0, &(0x7f00000000c0)=[{}, {}, {}], 0x3, 0x0, 0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r0, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x6, 0x10, 0xffffffffffffffff, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f00000003c0)={0x1f, 0x0, {0x2, 0x0, 0x4, 0x0, 0x7ff, 0x3}, 0x5, 0xffffffff}, 0xe) read(r0, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000300)=0x13, 0x4) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f0000000040)={0x20000003}) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x1, 0x4) mmap(&(0x7f0000f44000/0x4000)=nil, 0x507000, 0x1000007, 0x2013, r0, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000680), &(0x7f00000006c0)=0x4) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20004004}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4048040}, 0x10) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000200), 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, 0x0, 0x0) 09:10:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x7) getsockopt$netlink(r0, 0x10e, 0xa, &(0x7f0000000000)=""/109, &(0x7f00000000c0)=0x6d) socket$inet6(0xa, 0x1000000000006, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 09:10:55 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x2, 0x0) bind(r1, &(0x7f0000d80f80)=@generic={0x1e, "0101000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cd184a"}, 0x80) r2 = socket(0x1e, 0x5, 0x0) sendmsg(r2, &(0x7f0000316000)={&(0x7f0000dd7000)=@generic={0x10000000001e, "010000000000000000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 09:10:55 executing program 5: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x4, &(0x7f0000000180), 0x1) 09:10:55 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x2039648f) 09:10:55 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000000004, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x5, &(0x7f00000000c0)=""/25, &(0x7f0000000340)=0x19) 09:10:55 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x2, 0x0) bind(r1, &(0x7f0000d80f80)=@generic={0x1e, "0101000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cd184a"}, 0x80) r2 = socket(0x1e, 0x5, 0x0) sendmsg(r2, &(0x7f0000316000)={&(0x7f0000dd7000)=@generic={0x10000000001e, "010000000000000000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 09:10:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x7) getsockopt$netlink(r0, 0x10e, 0xa, &(0x7f0000000000)=""/109, &(0x7f00000000c0)=0x6d) socket$inet6(0xa, 0x1000000000006, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 09:10:55 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x2039648f) 09:10:55 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000000004, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x5, &(0x7f00000000c0)=""/25, &(0x7f0000000340)=0x19) 09:10:55 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x2, 0x0) bind(r1, &(0x7f0000d80f80)=@generic={0x1e, "0101000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cd184a"}, 0x80) r2 = socket(0x1e, 0x5, 0x0) sendmsg(r2, &(0x7f0000316000)={&(0x7f0000dd7000)=@generic={0x10000000001e, "010000000000000000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 09:10:55 executing program 5: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x4, &(0x7f0000000180), 0x1) 09:10:56 executing program 2: write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) epoll_pwait(r0, &(0x7f00000000c0)=[{}, {}, {}], 0x3, 0x0, 0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r0, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x6, 0x10, 0xffffffffffffffff, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f00000003c0)={0x1f, 0x0, {0x2, 0x0, 0x4, 0x0, 0x7ff, 0x3}, 0x5, 0xffffffff}, 0xe) read(r0, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000300)=0x13, 0x4) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f0000000040)={0x20000003}) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x1, 0x4) mmap(&(0x7f0000f44000/0x4000)=nil, 0x507000, 0x1000007, 0x2013, r0, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000680), &(0x7f00000006c0)=0x4) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20004004}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4048040}, 0x10) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000200), 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, 0x0, 0x0) 09:10:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x7) getsockopt$netlink(r0, 0x10e, 0xa, &(0x7f0000000000)=""/109, &(0x7f00000000c0)=0x6d) socket$inet6(0xa, 0x1000000000006, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 09:10:56 executing program 5: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x4, &(0x7f0000000180), 0x1) 09:10:56 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000000004, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x5, &(0x7f00000000c0)=""/25, &(0x7f0000000340)=0x19) 09:10:56 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x2039648f) 09:10:56 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket(0x1e, 0x2, 0x0) bind(r1, &(0x7f0000d80f80)=@generic={0x1e, "0101000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cd184a"}, 0x80) r2 = socket(0x1e, 0x5, 0x0) sendmsg(r2, &(0x7f0000316000)={&(0x7f0000dd7000)=@generic={0x10000000001e, "010000000000000000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 09:10:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0x4, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000000000000000000000000061122000000000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 09:10:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000040)=0x2d9, 0x4) write$binfmt_elf32(r2, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) close(r2) 09:10:56 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000980)=ANY=[@ANYBLOB='}'], 0x1) setsockopt$sock_int(r2, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) write$binfmt_elf32(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="02"], 0x1) recvmmsg(r2, &(0x7f0000002bc0)=[{{0x0, 0x0, &(0x7f0000002b00)=[{&(0x7f0000002a80)=""/95, 0x5f}], 0x1, &(0x7f0000000080)=""/62, 0x3e}}], 0x251, 0x0, 0x0) 09:10:56 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000080)=@deltaction={0x14, 0x31, 0x709}, 0x14}}, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f0000000700)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) [ 117.860371] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 09:10:56 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000080)=@deltaction={0x14, 0x31, 0x709}, 0x14}}, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f0000000700)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 09:10:56 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000080)=@deltaction={0x14, 0x31, 0x709}, 0x14}}, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f0000000700)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 09:10:57 executing program 2: write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) epoll_pwait(r0, &(0x7f00000000c0)=[{}, {}, {}], 0x3, 0x0, 0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r0, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x6, 0x10, 0xffffffffffffffff, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f00000003c0)={0x1f, 0x0, {0x2, 0x0, 0x4, 0x0, 0x7ff, 0x3}, 0x5, 0xffffffff}, 0xe) read(r0, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000300)=0x13, 0x4) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f0000000040)={0x20000003}) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x1, 0x4) mmap(&(0x7f0000f44000/0x4000)=nil, 0x507000, 0x1000007, 0x2013, r0, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000680), &(0x7f00000006c0)=0x4) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20004004}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4048040}, 0x10) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000200), 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, 0x0, 0x0) 09:10:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0x4, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000000000000000000000000061122000000000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 09:10:57 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000040)=0x2d9, 0x4) write$binfmt_elf32(r2, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) close(r2) 09:10:57 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000980)=ANY=[@ANYBLOB='}'], 0x1) setsockopt$sock_int(r2, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) write$binfmt_elf32(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="02"], 0x1) recvmmsg(r2, &(0x7f0000002bc0)=[{{0x0, 0x0, &(0x7f0000002b00)=[{&(0x7f0000002a80)=""/95, 0x5f}], 0x1, &(0x7f0000000080)=""/62, 0x3e}}], 0x251, 0x0, 0x0) 09:10:57 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000080)=@deltaction={0x14, 0x31, 0x709}, 0x14}}, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f0000000700)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 09:10:57 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000080)=@deltaction={0x14, 0x31, 0x709}, 0x14}}, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f0000000700)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 09:10:57 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000080)=@deltaction={0x14, 0x31, 0x709}, 0x14}}, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f0000000700)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 09:10:57 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000080)=@deltaction={0x14, 0x31, 0x709}, 0x14}}, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f0000000700)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 09:10:57 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000980)=ANY=[@ANYBLOB='}'], 0x1) setsockopt$sock_int(r2, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) write$binfmt_elf32(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="02"], 0x1) recvmmsg(r2, &(0x7f0000002bc0)=[{{0x0, 0x0, &(0x7f0000002b00)=[{&(0x7f0000002a80)=""/95, 0x5f}], 0x1, &(0x7f0000000080)=""/62, 0x3e}}], 0x251, 0x0, 0x0) 09:10:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0x4, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000000000000000000000000061122000000000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 09:10:57 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000040)=0x2d9, 0x4) write$binfmt_elf32(r2, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) close(r2) 09:10:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0x4, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000000000000000000000000061122000000000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 09:10:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000040)=0x2d9, 0x4) write$binfmt_elf32(r2, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) close(r2) 09:10:57 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000980)=ANY=[@ANYBLOB='}'], 0x1) setsockopt$sock_int(r2, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) write$binfmt_elf32(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="02"], 0x1) recvmmsg(r2, &(0x7f0000002bc0)=[{{0x0, 0x0, &(0x7f0000002b00)=[{&(0x7f0000002a80)=""/95, 0x5f}], 0x1, &(0x7f0000000080)=""/62, 0x3e}}], 0x251, 0x0, 0x0) 09:10:57 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000040)=0x2d9, 0x4) write$binfmt_elf32(r2, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) close(r2) 09:10:57 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000040)=0x2d9, 0x4) write$binfmt_elf32(r2, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) close(r2) 09:10:57 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000040)=0x2d9, 0x4) write$binfmt_elf32(r2, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) close(r2) [ 119.229568] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 119.245731] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 09:10:57 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='nv\x00', 0x26d) sendto$inet(r0, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x8034}, 0x100) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x20) [ 119.268967] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 09:10:58 executing program 5: r0 = socket$inet(0x2, 0x3, 0x6) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r2 = socket$netlink(0x10, 0x3, 0x4) connect$inet(r0, &(0x7f0000000080), 0x10) sendmsg$nl_generic(r2, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x48, 0x14, 0x7, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@generic="667e279639a91d7b7f11b1017daf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f423682a9447015739d53d5"]}, 0x48}}, 0x0) 09:10:58 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0x9, 0x4, &(0x7f0000519fa8)=@framed={{}, [@ldst={0x3, 0x0, 0xb, 0x1}]}, &(0x7f0000000000)="472edd3a4083b930504c00", 0x8000, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 09:10:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000040)=0x2d9, 0x4) write$binfmt_elf32(r2, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) close(r2) 09:10:58 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000040)=0x2d9, 0x4) write$binfmt_elf32(r2, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) close(r2) 09:10:58 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000040)=0x2d9, 0x4) write$binfmt_elf32(r2, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) close(r2) 09:10:58 executing program 5: r0 = socket$inet(0x2, 0x3, 0x6) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r2 = socket$netlink(0x10, 0x3, 0x4) connect$inet(r0, &(0x7f0000000080), 0x10) sendmsg$nl_generic(r2, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x48, 0x14, 0x7, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@generic="667e279639a91d7b7f11b1017daf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f423682a9447015739d53d5"]}, 0x48}}, 0x0) 09:10:58 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0x9, 0x4, &(0x7f0000519fa8)=@framed={{}, [@ldst={0x3, 0x0, 0xb, 0x1}]}, &(0x7f0000000000)="472edd3a4083b930504c00", 0x8000, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 09:10:58 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000040)=0x2d9, 0x4) write$binfmt_elf32(r2, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) close(r2) 09:10:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000040)=0x2d9, 0x4) write$binfmt_elf32(r2, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) close(r2) 09:10:58 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000040)=0x2d9, 0x4) write$binfmt_elf32(r2, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) close(r2) 09:10:58 executing program 5: r0 = socket$inet(0x2, 0x3, 0x6) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r2 = socket$netlink(0x10, 0x3, 0x4) connect$inet(r0, &(0x7f0000000080), 0x10) sendmsg$nl_generic(r2, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x48, 0x14, 0x7, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@generic="667e279639a91d7b7f11b1017daf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f423682a9447015739d53d5"]}, 0x48}}, 0x0) 09:10:58 executing program 4: setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) pipe(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) 09:10:58 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0x9, 0x4, &(0x7f0000519fa8)=@framed={{}, [@ldst={0x3, 0x0, 0xb, 0x1}]}, &(0x7f0000000000)="472edd3a4083b930504c00", 0x8000, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 09:10:58 executing program 5: r0 = socket$inet(0x2, 0x3, 0x6) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r2 = socket$netlink(0x10, 0x3, 0x4) connect$inet(r0, &(0x7f0000000080), 0x10) sendmsg$nl_generic(r2, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x48, 0x14, 0x7, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@generic="667e279639a91d7b7f11b1017daf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f423682a9447015739d53d5"]}, 0x48}}, 0x0) 09:10:58 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0x800000000c, &(0x7f00007e0000)=""/4, &(0x7f0000000080)=0x4) 09:10:58 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='nv\x00', 0x26d) sendto$inet(r0, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x8034}, 0x100) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x20) 09:10:58 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) getsockname(r1, 0x0, &(0x7f0000000080)) 09:10:58 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0x800000000c, &(0x7f00007e0000)=""/4, &(0x7f0000000080)=0x4) 09:10:58 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0x9, 0x4, &(0x7f0000519fa8)=@framed={{}, [@ldst={0x3, 0x0, 0xb, 0x1}]}, &(0x7f0000000000)="472edd3a4083b930504c00", 0x8000, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 09:10:58 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='nv\x00', 0x26d) sendto$inet(r0, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x8034}, 0x100) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x20) 09:10:58 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) getsockname(r1, 0x0, &(0x7f0000000080)) 09:10:59 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0x800000000c, &(0x7f00007e0000)=""/4, &(0x7f0000000080)=0x4) 09:10:59 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001d80)={"74756e6c3000000000000000e0002000", 0x0}) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r2}, 0x58) 09:10:59 executing program 4: setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) pipe(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) 09:10:59 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) getsockname(r1, 0x0, &(0x7f0000000080)) 09:10:59 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001d80)={"74756e6c3000000000000000e0002000", 0x0}) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r2}, 0x58) 09:10:59 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0x800000000c, &(0x7f00007e0000)=""/4, &(0x7f0000000080)=0x4) 09:10:59 executing program 4: setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) pipe(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) 09:10:59 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001d80)={"74756e6c3000000000000000e0002000", 0x0}) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r2}, 0x58) 09:10:59 executing program 1: setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) pipe(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) 09:10:59 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) getsockname(r1, 0x0, &(0x7f0000000080)) 09:10:59 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='nv\x00', 0x26d) sendto$inet(r0, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x8034}, 0x100) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x20) 09:10:59 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='nv\x00', 0x26d) sendto$inet(r0, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x8034}, 0x100) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x20) 09:10:59 executing program 1: setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) pipe(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) 09:10:59 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001d80)={"74756e6c3000000000000000e0002000", 0x0}) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r2}, 0x58) 09:10:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x200408d4, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_buf(r0, 0x29, 0x3a, &(0x7f0000000340)="7c6ceba2", 0x4) sendto$inet6(r0, &(0x7f0000000180)="cc", 0x1, 0x11, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000003c0)="8a", 0x1, 0x0, 0x0, 0x0) 09:10:59 executing program 4: setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) pipe(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) 09:10:59 executing program 3: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000300), 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)="68756765746c04000000000000006167655f69725f5aa2f4657300", 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000340)={0x20}) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000040), &(0x7f0000000180)=0x4) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x100000000017, &(0x7f0000000600), 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000240)=0x200) pwrite64(r0, &(0x7f0000000f40)=' ', 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x50) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, 0x0, &(0x7f0000000780)) gettid() r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={r1, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000640)='\x00'}, 0x25) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="6367706f75702e6576656e7473003ea55e10a8299d73ee6d72da86f4dbed2f19b52a48a90e618729894c918a4985eb8f6f2c31681f988720c1753c87f13d0361b825fe2f4ac4ad9edbd55eebfe0cee240ff894a14ae0ebe6c841b49bedc14402a1528815b5af7235f0efcee6b1cba8728161d61a1ab8a917c2b5", 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x10076) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, &(0x7f0000000800)) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000f80), &(0x7f00000002c0)=0xfffffffffffffdc5) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) unshare(0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r0, 0x0, 0xf0, 0x0, 0x100011000010}) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0x8) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000840)={'filter\x00', 0x7, 0x4, 0x558, 0x258, 0x0, 0x258, 0x470, 0x470, 0x470, 0x4, 0x0, {[{{@arp={@broadcast, @empty, 0xffffffff, 0xffffffff, @empty, {[0xff, 0x0, 0xff, 0xff, 0x0, 0xff]}, @empty, {[0x0, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x2, 0x3, 0x80, 0x81, 0x8, 0x40, 'lo\x00', 'rose0\x00', {0xff}, {0xff}}, 0xf0, 0x118}, @unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x2}}}, {{@arp={@loopback, @multicast1, 0xff0000ff, 0xff, @empty, {[0xff, 0xff, 0x0, 0x0, 0x0, 0xff]}, @mac=@local, {[0xff, 0x0, 0xff, 0xff]}, 0x7, 0x10000, 0x1, 0x40, 0x6, 0x5fe23a1a, 'ip6tnl0\x00', 'syzkaller1\x00', {}, {}, 0x0, 0x300}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @empty, @empty, 0x8}}}, {{@arp={@local, @local, 0x0, 0xffffff00, @mac=@dev, {[0xff, 0x0, 0xff, 0x0, 0x0, 0xff]}, @mac=@remote, {[0xff, 0xff, 0x0, 0xff, 0x0, 0xff]}, 0x3f, 0x400, 0x0, 0x200000000000000, 0x6, 0xf2, 'veth0_to_bridge\x00', 'ipddp0\x00', {0xff}, {0xff}, 0x0, 0x40}, 0xf0, 0x218}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x80000001, 'system_u:object_r:gpg_helper_exec_t:s0\x00'}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x5a8) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={r3, 0x3}, 0x8) 09:10:59 executing program 1: setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) pipe(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) 09:10:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x200408d4, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_buf(r0, 0x29, 0x3a, &(0x7f0000000340)="7c6ceba2", 0x4) sendto$inet6(r0, &(0x7f0000000180)="cc", 0x1, 0x11, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000003c0)="8a", 0x1, 0x0, 0x0, 0x0) 09:11:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x200408d4, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_buf(r0, 0x29, 0x3a, &(0x7f0000000340)="7c6ceba2", 0x4) sendto$inet6(r0, &(0x7f0000000180)="cc", 0x1, 0x11, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000003c0)="8a", 0x1, 0x0, 0x0, 0x0) 09:11:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x200408d4, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_buf(r0, 0x29, 0x3a, &(0x7f0000000340)="7c6ceba2", 0x4) sendto$inet6(r0, &(0x7f0000000180)="cc", 0x1, 0x11, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000003c0)="8a", 0x1, 0x0, 0x0, 0x0) 09:11:00 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x2, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000080)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4000000000003fb, 0x0) 09:11:00 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='nv\x00', 0x26d) sendto$inet(r0, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x8034}, 0x100) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x20) 09:11:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x200408d4, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_buf(r0, 0x29, 0x3a, &(0x7f0000000340)="7c6ceba2", 0x4) sendto$inet6(r0, &(0x7f0000000180)="cc", 0x1, 0x11, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000003c0)="8a", 0x1, 0x0, 0x0, 0x0) 09:11:00 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='nv\x00', 0x26d) sendto$inet(r0, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x8034}, 0x100) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x20) 09:11:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x200408d4, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_buf(r0, 0x29, 0x3a, &(0x7f0000000340)="7c6ceba2", 0x4) sendto$inet6(r0, &(0x7f0000000180)="cc", 0x1, 0x11, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000003c0)="8a", 0x1, 0x0, 0x0, 0x0) 09:11:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x200408d4, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_buf(r0, 0x29, 0x3a, &(0x7f0000000340)="7c6ceba2", 0x4) sendto$inet6(r0, &(0x7f0000000180)="cc", 0x1, 0x11, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000003c0)="8a", 0x1, 0x0, 0x0, 0x0) 09:11:00 executing program 0: r0 = socket$inet(0x10, 0x3, 0xc) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234588dd25d766070") sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001640)="24000000100007031dfffd946fa2830020200a0009000300001c85680c1ba3a20400ff7e280000000c0affffba16a0aa1c0009b356da5a80d18bec4c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) [ 122.044184] netlink: 20 bytes leftover after parsing attributes in process `syz-executor0'. [ 122.103188] netlink: 20 bytes leftover after parsing attributes in process `syz-executor0'. 09:11:01 executing program 3: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000300), 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)="68756765746c04000000000000006167655f69725f5aa2f4657300", 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000340)={0x20}) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000040), &(0x7f0000000180)=0x4) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x100000000017, &(0x7f0000000600), 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000240)=0x200) pwrite64(r0, &(0x7f0000000f40)=' ', 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x50) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, 0x0, &(0x7f0000000780)) gettid() r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={r1, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000640)='\x00'}, 0x25) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="6367706f75702e6576656e7473003ea55e10a8299d73ee6d72da86f4dbed2f19b52a48a90e618729894c918a4985eb8f6f2c31681f988720c1753c87f13d0361b825fe2f4ac4ad9edbd55eebfe0cee240ff894a14ae0ebe6c841b49bedc14402a1528815b5af7235f0efcee6b1cba8728161d61a1ab8a917c2b5", 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x10076) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, &(0x7f0000000800)) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000f80), &(0x7f00000002c0)=0xfffffffffffffdc5) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) unshare(0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r0, 0x0, 0xf0, 0x0, 0x100011000010}) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0x8) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000840)={'filter\x00', 0x7, 0x4, 0x558, 0x258, 0x0, 0x258, 0x470, 0x470, 0x470, 0x4, 0x0, {[{{@arp={@broadcast, @empty, 0xffffffff, 0xffffffff, @empty, {[0xff, 0x0, 0xff, 0xff, 0x0, 0xff]}, @empty, {[0x0, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x2, 0x3, 0x80, 0x81, 0x8, 0x40, 'lo\x00', 'rose0\x00', {0xff}, {0xff}}, 0xf0, 0x118}, @unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x2}}}, {{@arp={@loopback, @multicast1, 0xff0000ff, 0xff, @empty, {[0xff, 0xff, 0x0, 0x0, 0x0, 0xff]}, @mac=@local, {[0xff, 0x0, 0xff, 0xff]}, 0x7, 0x10000, 0x1, 0x40, 0x6, 0x5fe23a1a, 'ip6tnl0\x00', 'syzkaller1\x00', {}, {}, 0x0, 0x300}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @empty, @empty, 0x8}}}, {{@arp={@local, @local, 0x0, 0xffffff00, @mac=@dev, {[0xff, 0x0, 0xff, 0x0, 0x0, 0xff]}, @mac=@remote, {[0xff, 0xff, 0x0, 0xff, 0x0, 0xff]}, 0x3f, 0x400, 0x0, 0x200000000000000, 0x6, 0xf2, 'veth0_to_bridge\x00', 'ipddp0\x00', {0xff}, {0xff}, 0x0, 0x40}, 0xf0, 0x218}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x80000001, 'system_u:object_r:gpg_helper_exec_t:s0\x00'}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x5a8) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={r3, 0x3}, 0x8) 09:11:01 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet(0x2, 0x3, 0xff) sendmsg(r1, &(0x7f00000014c0)={&(0x7f0000716000)=@in, 0x80, &(0x7f0000685000)=[{&(0x7f0000001480)="b58872000000e78f77c58e2438dc000000000000", 0x14}], 0x1}, 0x0) 09:11:01 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x2, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000080)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4000000000003fb, 0x0) 09:11:01 executing program 0: r0 = socket$inet(0x10, 0x3, 0xc) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234588dd25d766070") sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001640)="24000000100007031dfffd946fa2830020200a0009000300001c85680c1ba3a20400ff7e280000000c0affffba16a0aa1c0009b356da5a80d18bec4c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 09:11:01 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet(0x2, 0x3, 0xff) sendmsg(r1, &(0x7f00000014c0)={&(0x7f0000716000)=@in, 0x80, &(0x7f0000685000)=[{&(0x7f0000001480)="b58872000000e78f77c58e2438dc000000000000", 0x14}], 0x1}, 0x0) [ 122.345852] netlink: 20 bytes leftover after parsing attributes in process `syz-executor0'. 09:11:01 executing program 0: r0 = socket$inet(0x10, 0x3, 0xc) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234588dd25d766070") sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001640)="24000000100007031dfffd946fa2830020200a0009000300001c85680c1ba3a20400ff7e280000000c0affffba16a0aa1c0009b356da5a80d18bec4c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 09:11:01 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet(0x2, 0x3, 0xff) sendmsg(r1, &(0x7f00000014c0)={&(0x7f0000716000)=@in, 0x80, &(0x7f0000685000)=[{&(0x7f0000001480)="b58872000000e78f77c58e2438dc000000000000", 0x14}], 0x1}, 0x0) [ 122.521034] netlink: 20 bytes leftover after parsing attributes in process `syz-executor0'. 09:11:01 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000300), 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)="68756765746c04000000000000006167655f69725f5aa2f4657300", 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000340)={0x20}) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000040), &(0x7f0000000180)=0x4) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x100000000017, &(0x7f0000000600), 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000240)=0x200) pwrite64(r0, &(0x7f0000000f40)=' ', 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x50) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, 0x0, &(0x7f0000000780)) gettid() r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={r1, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000640)='\x00'}, 0x25) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="6367706f75702e6576656e7473003ea55e10a8299d73ee6d72da86f4dbed2f19b52a48a90e618729894c918a4985eb8f6f2c31681f988720c1753c87f13d0361b825fe2f4ac4ad9edbd55eebfe0cee240ff894a14ae0ebe6c841b49bedc14402a1528815b5af7235f0efcee6b1cba8728161d61a1ab8a917c2b5", 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x10076) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, &(0x7f0000000800)) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000f80), &(0x7f00000002c0)=0xfffffffffffffdc5) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) unshare(0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r0, 0x0, 0xf0, 0x0, 0x100011000010}) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0x8) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000840)={'filter\x00', 0x7, 0x4, 0x558, 0x258, 0x0, 0x258, 0x470, 0x470, 0x470, 0x4, 0x0, {[{{@arp={@broadcast, @empty, 0xffffffff, 0xffffffff, @empty, {[0xff, 0x0, 0xff, 0xff, 0x0, 0xff]}, @empty, {[0x0, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x2, 0x3, 0x80, 0x81, 0x8, 0x40, 'lo\x00', 'rose0\x00', {0xff}, {0xff}}, 0xf0, 0x118}, @unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x2}}}, {{@arp={@loopback, @multicast1, 0xff0000ff, 0xff, @empty, {[0xff, 0xff, 0x0, 0x0, 0x0, 0xff]}, @mac=@local, {[0xff, 0x0, 0xff, 0xff]}, 0x7, 0x10000, 0x1, 0x40, 0x6, 0x5fe23a1a, 'ip6tnl0\x00', 'syzkaller1\x00', {}, {}, 0x0, 0x300}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @empty, @empty, 0x8}}}, {{@arp={@local, @local, 0x0, 0xffffff00, @mac=@dev, {[0xff, 0x0, 0xff, 0x0, 0x0, 0xff]}, @mac=@remote, {[0xff, 0xff, 0x0, 0xff, 0x0, 0xff]}, 0x3f, 0x400, 0x0, 0x200000000000000, 0x6, 0xf2, 'veth0_to_bridge\x00', 'ipddp0\x00', {0xff}, {0xff}, 0x0, 0x40}, 0xf0, 0x218}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x80000001, 'system_u:object_r:gpg_helper_exec_t:s0\x00'}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x5a8) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={r3, 0x3}, 0x8) 09:11:01 executing program 0: r0 = socket$inet(0x10, 0x3, 0xc) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234588dd25d766070") sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001640)="24000000100007031dfffd946fa2830020200a0009000300001c85680c1ba3a20400ff7e280000000c0affffba16a0aa1c0009b356da5a80d18bec4c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 09:11:01 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet(0x2, 0x3, 0xff) sendmsg(r1, &(0x7f00000014c0)={&(0x7f0000716000)=@in, 0x80, &(0x7f0000685000)=[{&(0x7f0000001480)="b58872000000e78f77c58e2438dc000000000000", 0x14}], 0x1}, 0x0) 09:11:01 executing program 5: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000300), 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)="68756765746c04000000000000006167655f69725f5aa2f4657300", 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000340)={0x20}) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000040), &(0x7f0000000180)=0x4) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x100000000017, &(0x7f0000000600), 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000240)=0x200) pwrite64(r0, &(0x7f0000000f40)=' ', 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x50) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, 0x0, &(0x7f0000000780)) gettid() r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={r1, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000640)='\x00'}, 0x25) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="6367706f75702e6576656e7473003ea55e10a8299d73ee6d72da86f4dbed2f19b52a48a90e618729894c918a4985eb8f6f2c31681f988720c1753c87f13d0361b825fe2f4ac4ad9edbd55eebfe0cee240ff894a14ae0ebe6c841b49bedc14402a1528815b5af7235f0efcee6b1cba8728161d61a1ab8a917c2b5", 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x10076) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, &(0x7f0000000800)) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000f80), &(0x7f00000002c0)=0xfffffffffffffdc5) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) unshare(0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r0, 0x0, 0xf0, 0x0, 0x100011000010}) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0x8) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000840)={'filter\x00', 0x7, 0x4, 0x558, 0x258, 0x0, 0x258, 0x470, 0x470, 0x470, 0x4, 0x0, {[{{@arp={@broadcast, @empty, 0xffffffff, 0xffffffff, @empty, {[0xff, 0x0, 0xff, 0xff, 0x0, 0xff]}, @empty, {[0x0, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x2, 0x3, 0x80, 0x81, 0x8, 0x40, 'lo\x00', 'rose0\x00', {0xff}, {0xff}}, 0xf0, 0x118}, @unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x2}}}, {{@arp={@loopback, @multicast1, 0xff0000ff, 0xff, @empty, {[0xff, 0xff, 0x0, 0x0, 0x0, 0xff]}, @mac=@local, {[0xff, 0x0, 0xff, 0xff]}, 0x7, 0x10000, 0x1, 0x40, 0x6, 0x5fe23a1a, 'ip6tnl0\x00', 'syzkaller1\x00', {}, {}, 0x0, 0x300}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @empty, @empty, 0x8}}}, {{@arp={@local, @local, 0x0, 0xffffff00, @mac=@dev, {[0xff, 0x0, 0xff, 0x0, 0x0, 0xff]}, @mac=@remote, {[0xff, 0xff, 0x0, 0xff, 0x0, 0xff]}, 0x3f, 0x400, 0x0, 0x200000000000000, 0x6, 0xf2, 'veth0_to_bridge\x00', 'ipddp0\x00', {0xff}, {0xff}, 0x0, 0x40}, 0xf0, 0x218}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x80000001, 'system_u:object_r:gpg_helper_exec_t:s0\x00'}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x5a8) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={r3, 0x3}, 0x8) [ 122.868353] netlink: 20 bytes leftover after parsing attributes in process `syz-executor0'. 09:11:01 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x2, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000080)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4000000000003fb, 0x0) 09:11:02 executing program 3: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000300), 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)="68756765746c04000000000000006167655f69725f5aa2f4657300", 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000340)={0x20}) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000040), &(0x7f0000000180)=0x4) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x100000000017, &(0x7f0000000600), 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000240)=0x200) pwrite64(r0, &(0x7f0000000f40)=' ', 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x50) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, 0x0, &(0x7f0000000780)) gettid() r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={r1, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000640)='\x00'}, 0x25) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="6367706f75702e6576656e7473003ea55e10a8299d73ee6d72da86f4dbed2f19b52a48a90e618729894c918a4985eb8f6f2c31681f988720c1753c87f13d0361b825fe2f4ac4ad9edbd55eebfe0cee240ff894a14ae0ebe6c841b49bedc14402a1528815b5af7235f0efcee6b1cba8728161d61a1ab8a917c2b5", 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x10076) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, &(0x7f0000000800)) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000f80), &(0x7f00000002c0)=0xfffffffffffffdc5) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) unshare(0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r0, 0x0, 0xf0, 0x0, 0x100011000010}) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0x8) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000840)={'filter\x00', 0x7, 0x4, 0x558, 0x258, 0x0, 0x258, 0x470, 0x470, 0x470, 0x4, 0x0, {[{{@arp={@broadcast, @empty, 0xffffffff, 0xffffffff, @empty, {[0xff, 0x0, 0xff, 0xff, 0x0, 0xff]}, @empty, {[0x0, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x2, 0x3, 0x80, 0x81, 0x8, 0x40, 'lo\x00', 'rose0\x00', {0xff}, {0xff}}, 0xf0, 0x118}, @unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x2}}}, {{@arp={@loopback, @multicast1, 0xff0000ff, 0xff, @empty, {[0xff, 0xff, 0x0, 0x0, 0x0, 0xff]}, @mac=@local, {[0xff, 0x0, 0xff, 0xff]}, 0x7, 0x10000, 0x1, 0x40, 0x6, 0x5fe23a1a, 'ip6tnl0\x00', 'syzkaller1\x00', {}, {}, 0x0, 0x300}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @empty, @empty, 0x8}}}, {{@arp={@local, @local, 0x0, 0xffffff00, @mac=@dev, {[0xff, 0x0, 0xff, 0x0, 0x0, 0xff]}, @mac=@remote, {[0xff, 0xff, 0x0, 0xff, 0x0, 0xff]}, 0x3f, 0x400, 0x0, 0x200000000000000, 0x6, 0xf2, 'veth0_to_bridge\x00', 'ipddp0\x00', {0xff}, {0xff}, 0x0, 0x40}, 0xf0, 0x218}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x80000001, 'system_u:object_r:gpg_helper_exec_t:s0\x00'}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x5a8) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={r3, 0x3}, 0x8) 09:11:02 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x25fa) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) 09:11:02 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x2, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000080)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4000000000003fb, 0x0) 09:11:02 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x25fa) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) 09:11:02 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x2, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000080)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4000000000003fb, 0x0) 09:11:02 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x25fa) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) 09:11:02 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x25fa) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) 09:11:02 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000300), 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)="68756765746c04000000000000006167655f69725f5aa2f4657300", 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000340)={0x20}) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000040), &(0x7f0000000180)=0x4) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x100000000017, &(0x7f0000000600), 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000240)=0x200) pwrite64(r0, &(0x7f0000000f40)=' ', 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x50) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, 0x0, &(0x7f0000000780)) gettid() r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={r1, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000640)='\x00'}, 0x25) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="6367706f75702e6576656e7473003ea55e10a8299d73ee6d72da86f4dbed2f19b52a48a90e618729894c918a4985eb8f6f2c31681f988720c1753c87f13d0361b825fe2f4ac4ad9edbd55eebfe0cee240ff894a14ae0ebe6c841b49bedc14402a1528815b5af7235f0efcee6b1cba8728161d61a1ab8a917c2b5", 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x10076) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, &(0x7f0000000800)) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000f80), &(0x7f00000002c0)=0xfffffffffffffdc5) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) unshare(0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r0, 0x0, 0xf0, 0x0, 0x100011000010}) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0x8) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000840)={'filter\x00', 0x7, 0x4, 0x558, 0x258, 0x0, 0x258, 0x470, 0x470, 0x470, 0x4, 0x0, {[{{@arp={@broadcast, @empty, 0xffffffff, 0xffffffff, @empty, {[0xff, 0x0, 0xff, 0xff, 0x0, 0xff]}, @empty, {[0x0, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x2, 0x3, 0x80, 0x81, 0x8, 0x40, 'lo\x00', 'rose0\x00', {0xff}, {0xff}}, 0xf0, 0x118}, @unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x2}}}, {{@arp={@loopback, @multicast1, 0xff0000ff, 0xff, @empty, {[0xff, 0xff, 0x0, 0x0, 0x0, 0xff]}, @mac=@local, {[0xff, 0x0, 0xff, 0xff]}, 0x7, 0x10000, 0x1, 0x40, 0x6, 0x5fe23a1a, 'ip6tnl0\x00', 'syzkaller1\x00', {}, {}, 0x0, 0x300}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @empty, @empty, 0x8}}}, {{@arp={@local, @local, 0x0, 0xffffff00, @mac=@dev, {[0xff, 0x0, 0xff, 0x0, 0x0, 0xff]}, @mac=@remote, {[0xff, 0xff, 0x0, 0xff, 0x0, 0xff]}, 0x3f, 0x400, 0x0, 0x200000000000000, 0x6, 0xf2, 'veth0_to_bridge\x00', 'ipddp0\x00', {0xff}, {0xff}, 0x0, 0x40}, 0xf0, 0x218}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x80000001, 'system_u:object_r:gpg_helper_exec_t:s0\x00'}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x5a8) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={r3, 0x3}, 0x8) 09:11:02 executing program 0: bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @multicast1}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) 09:11:02 executing program 5: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000300), 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)="68756765746c04000000000000006167655f69725f5aa2f4657300", 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000340)={0x20}) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000040), &(0x7f0000000180)=0x4) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x100000000017, &(0x7f0000000600), 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000240)=0x200) pwrite64(r0, &(0x7f0000000f40)=' ', 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x50) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, 0x0, &(0x7f0000000780)) gettid() r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={r1, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000640)='\x00'}, 0x25) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="6367706f75702e6576656e7473003ea55e10a8299d73ee6d72da86f4dbed2f19b52a48a90e618729894c918a4985eb8f6f2c31681f988720c1753c87f13d0361b825fe2f4ac4ad9edbd55eebfe0cee240ff894a14ae0ebe6c841b49bedc14402a1528815b5af7235f0efcee6b1cba8728161d61a1ab8a917c2b5", 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x10076) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, &(0x7f0000000800)) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000f80), &(0x7f00000002c0)=0xfffffffffffffdc5) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) unshare(0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r0, 0x0, 0xf0, 0x0, 0x100011000010}) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0x8) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000840)={'filter\x00', 0x7, 0x4, 0x558, 0x258, 0x0, 0x258, 0x470, 0x470, 0x470, 0x4, 0x0, {[{{@arp={@broadcast, @empty, 0xffffffff, 0xffffffff, @empty, {[0xff, 0x0, 0xff, 0xff, 0x0, 0xff]}, @empty, {[0x0, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x2, 0x3, 0x80, 0x81, 0x8, 0x40, 'lo\x00', 'rose0\x00', {0xff}, {0xff}}, 0xf0, 0x118}, @unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x2}}}, {{@arp={@loopback, @multicast1, 0xff0000ff, 0xff, @empty, {[0xff, 0xff, 0x0, 0x0, 0x0, 0xff]}, @mac=@local, {[0xff, 0x0, 0xff, 0xff]}, 0x7, 0x10000, 0x1, 0x40, 0x6, 0x5fe23a1a, 'ip6tnl0\x00', 'syzkaller1\x00', {}, {}, 0x0, 0x300}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @empty, @empty, 0x8}}}, {{@arp={@local, @local, 0x0, 0xffffff00, @mac=@dev, {[0xff, 0x0, 0xff, 0x0, 0x0, 0xff]}, @mac=@remote, {[0xff, 0xff, 0x0, 0xff, 0x0, 0xff]}, 0x3f, 0x400, 0x0, 0x200000000000000, 0x6, 0xf2, 'veth0_to_bridge\x00', 'ipddp0\x00', {0xff}, {0xff}, 0x0, 0x40}, 0xf0, 0x218}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x80000001, 'system_u:object_r:gpg_helper_exec_t:s0\x00'}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x5a8) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={r3, 0x3}, 0x8) 09:11:02 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x2, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000080)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4000000000003fb, 0x0) 09:11:03 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x2, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000080)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4000000000003fb, 0x0) 09:11:03 executing program 3: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000300), 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)="68756765746c04000000000000006167655f69725f5aa2f4657300", 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000340)={0x20}) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000040), &(0x7f0000000180)=0x4) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x100000000017, &(0x7f0000000600), 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000240)=0x200) pwrite64(r0, &(0x7f0000000f40)=' ', 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x50) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, 0x0, &(0x7f0000000780)) gettid() r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={r1, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000640)='\x00'}, 0x25) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="6367706f75702e6576656e7473003ea55e10a8299d73ee6d72da86f4dbed2f19b52a48a90e618729894c918a4985eb8f6f2c31681f988720c1753c87f13d0361b825fe2f4ac4ad9edbd55eebfe0cee240ff894a14ae0ebe6c841b49bedc14402a1528815b5af7235f0efcee6b1cba8728161d61a1ab8a917c2b5", 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x10076) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, &(0x7f0000000800)) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000f80), &(0x7f00000002c0)=0xfffffffffffffdc5) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) unshare(0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r0, 0x0, 0xf0, 0x0, 0x100011000010}) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0x8) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000840)={'filter\x00', 0x7, 0x4, 0x558, 0x258, 0x0, 0x258, 0x470, 0x470, 0x470, 0x4, 0x0, {[{{@arp={@broadcast, @empty, 0xffffffff, 0xffffffff, @empty, {[0xff, 0x0, 0xff, 0xff, 0x0, 0xff]}, @empty, {[0x0, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x2, 0x3, 0x80, 0x81, 0x8, 0x40, 'lo\x00', 'rose0\x00', {0xff}, {0xff}}, 0xf0, 0x118}, @unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x2}}}, {{@arp={@loopback, @multicast1, 0xff0000ff, 0xff, @empty, {[0xff, 0xff, 0x0, 0x0, 0x0, 0xff]}, @mac=@local, {[0xff, 0x0, 0xff, 0xff]}, 0x7, 0x10000, 0x1, 0x40, 0x6, 0x5fe23a1a, 'ip6tnl0\x00', 'syzkaller1\x00', {}, {}, 0x0, 0x300}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @empty, @empty, 0x8}}}, {{@arp={@local, @local, 0x0, 0xffffff00, @mac=@dev, {[0xff, 0x0, 0xff, 0x0, 0x0, 0xff]}, @mac=@remote, {[0xff, 0xff, 0x0, 0xff, 0x0, 0xff]}, 0x3f, 0x400, 0x0, 0x200000000000000, 0x6, 0xf2, 'veth0_to_bridge\x00', 'ipddp0\x00', {0xff}, {0xff}, 0x0, 0x40}, 0xf0, 0x218}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x80000001, 'system_u:object_r:gpg_helper_exec_t:s0\x00'}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x5a8) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={r3, 0x3}, 0x8) 09:11:03 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000400)={&(0x7f0000000200)=@ll, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/19, 0x13}, {0xffffffffffffffff}, {0x0}], 0x3, 0x0, 0x0, 0x5}, 0x21) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000007700)={0x18, 0x0, {0x5, @link_local, 'ip6gre0\x00'}}, 0x1e) ioctl(r0, 0x1ff, &(0x7f0000000600)="ba73e253da6d5403b6b62e430eb47707") epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x4000000000080003, 0x0) bind$packet(r2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f000000d180), 0x255, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='rdma.current\x00', 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) r3 = socket$inet6(0xa, 0x2000000802, 0x0) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r5 = socket$inet(0x10, 0x3, 0xc) sendmsg(r5, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000b0607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_int(r3, 0x29, 0x4d, &(0x7f0000000000)=0xfffffffffffffffe, 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000680)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000780)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x3000c00}, 0xc, &(0x7f0000000740)={&(0x7f00000007c0)=ANY=[@ANYBLOB="000229bd7000ffdbdf250a0000000c00020008000800010400000800060001000080340002000800040006000000080005000400000008000500e700000008000300030000000800070003000000080004000000000008000600030000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x20008000) unshare(0x40000000) r6 = socket$inet6(0xa, 0x4000000000003, 0x3a) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000500)={'syzkaller0\x00', {0x2, 0x4e22}}) setsockopt$inet6_int(r6, 0x29, 0xc8, &(0x7f00000004c0)=0xa, 0x38) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x1f, 0x1, 0x0, 0x80000000000004}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r6, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @remote}}, 0xb) 09:11:03 executing program 1: r0 = socket(0x1e, 0x805, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000280)=@req3={0x80000000, 0x1}, 0x1c) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0x94) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "01000009d0010100000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) 09:11:03 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x3, &(0x7f0000dc6ffe), &(0x7f0000904000)=0x4) [ 124.981210] netlink: 'syz-executor0': attribute type 1 has an invalid length. [ 125.005036] netlink: 20 bytes leftover after parsing attributes in process `syz-executor0'. 09:11:03 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x3, &(0x7f0000dc6ffe), &(0x7f0000904000)=0x4) [ 125.088606] IPVS: ftp: loaded support on port[0] = 21 09:11:03 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x3, &(0x7f0000dc6ffe), &(0x7f0000904000)=0x4) 09:11:03 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu\x00', 0x200002, 0x0) close(r0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f00000001c0)='cgroup.type\x00', 0x2, 0x0) readv(r1, &(0x7f0000000080)=[{&(0x7f00000000c0)=""/86, 0x25d}], 0x1) 09:11:04 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000300), 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)="68756765746c04000000000000006167655f69725f5aa2f4657300", 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000340)={0x20}) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000040), &(0x7f0000000180)=0x4) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x100000000017, &(0x7f0000000600), 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000240)=0x200) pwrite64(r0, &(0x7f0000000f40)=' ', 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x50) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, 0x0, &(0x7f0000000780)) gettid() r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={r1, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000640)='\x00'}, 0x25) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="6367706f75702e6576656e7473003ea55e10a8299d73ee6d72da86f4dbed2f19b52a48a90e618729894c918a4985eb8f6f2c31681f988720c1753c87f13d0361b825fe2f4ac4ad9edbd55eebfe0cee240ff894a14ae0ebe6c841b49bedc14402a1528815b5af7235f0efcee6b1cba8728161d61a1ab8a917c2b5", 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x10076) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, &(0x7f0000000800)) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000f80), &(0x7f00000002c0)=0xfffffffffffffdc5) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) unshare(0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r0, 0x0, 0xf0, 0x0, 0x100011000010}) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0x8) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000840)={'filter\x00', 0x7, 0x4, 0x558, 0x258, 0x0, 0x258, 0x470, 0x470, 0x470, 0x4, 0x0, {[{{@arp={@broadcast, @empty, 0xffffffff, 0xffffffff, @empty, {[0xff, 0x0, 0xff, 0xff, 0x0, 0xff]}, @empty, {[0x0, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x2, 0x3, 0x80, 0x81, 0x8, 0x40, 'lo\x00', 'rose0\x00', {0xff}, {0xff}}, 0xf0, 0x118}, @unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x2}}}, {{@arp={@loopback, @multicast1, 0xff0000ff, 0xff, @empty, {[0xff, 0xff, 0x0, 0x0, 0x0, 0xff]}, @mac=@local, {[0xff, 0x0, 0xff, 0xff]}, 0x7, 0x10000, 0x1, 0x40, 0x6, 0x5fe23a1a, 'ip6tnl0\x00', 'syzkaller1\x00', {}, {}, 0x0, 0x300}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @empty, @empty, 0x8}}}, {{@arp={@local, @local, 0x0, 0xffffff00, @mac=@dev, {[0xff, 0x0, 0xff, 0x0, 0x0, 0xff]}, @mac=@remote, {[0xff, 0xff, 0x0, 0xff, 0x0, 0xff]}, 0x3f, 0x400, 0x0, 0x200000000000000, 0x6, 0xf2, 'veth0_to_bridge\x00', 'ipddp0\x00', {0xff}, {0xff}, 0x0, 0x40}, 0xf0, 0x218}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x80000001, 'system_u:object_r:gpg_helper_exec_t:s0\x00'}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x5a8) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={r3, 0x3}, 0x8) 09:11:04 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000140)={0x84, @rand_addr, 0x0, 0x0, 'rr\x00', 0xffffffffffffffff, 0x8, 0x2}, 0x2c) 09:11:04 executing program 5: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000300), 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)="68756765746c04000000000000006167655f69725f5aa2f4657300", 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000340)={0x20}) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000040), &(0x7f0000000180)=0x4) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x100000000017, &(0x7f0000000600), 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000240)=0x200) pwrite64(r0, &(0x7f0000000f40)=' ', 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x50) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, 0x0, &(0x7f0000000780)) gettid() r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={r1, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000640)='\x00'}, 0x25) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="6367706f75702e6576656e7473003ea55e10a8299d73ee6d72da86f4dbed2f19b52a48a90e618729894c918a4985eb8f6f2c31681f988720c1753c87f13d0361b825fe2f4ac4ad9edbd55eebfe0cee240ff894a14ae0ebe6c841b49bedc14402a1528815b5af7235f0efcee6b1cba8728161d61a1ab8a917c2b5", 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x10076) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, &(0x7f0000000800)) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000f80), &(0x7f00000002c0)=0xfffffffffffffdc5) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) unshare(0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r0, 0x0, 0xf0, 0x0, 0x100011000010}) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0x8) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000840)={'filter\x00', 0x7, 0x4, 0x558, 0x258, 0x0, 0x258, 0x470, 0x470, 0x470, 0x4, 0x0, {[{{@arp={@broadcast, @empty, 0xffffffff, 0xffffffff, @empty, {[0xff, 0x0, 0xff, 0xff, 0x0, 0xff]}, @empty, {[0x0, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x2, 0x3, 0x80, 0x81, 0x8, 0x40, 'lo\x00', 'rose0\x00', {0xff}, {0xff}}, 0xf0, 0x118}, @unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x2}}}, {{@arp={@loopback, @multicast1, 0xff0000ff, 0xff, @empty, {[0xff, 0xff, 0x0, 0x0, 0x0, 0xff]}, @mac=@local, {[0xff, 0x0, 0xff, 0xff]}, 0x7, 0x10000, 0x1, 0x40, 0x6, 0x5fe23a1a, 'ip6tnl0\x00', 'syzkaller1\x00', {}, {}, 0x0, 0x300}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @empty, @empty, 0x8}}}, {{@arp={@local, @local, 0x0, 0xffffff00, @mac=@dev, {[0xff, 0x0, 0xff, 0x0, 0x0, 0xff]}, @mac=@remote, {[0xff, 0xff, 0x0, 0xff, 0x0, 0xff]}, 0x3f, 0x400, 0x0, 0x200000000000000, 0x6, 0xf2, 'veth0_to_bridge\x00', 'ipddp0\x00', {0xff}, {0xff}, 0x0, 0x40}, 0xf0, 0x218}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x80000001, 'system_u:object_r:gpg_helper_exec_t:s0\x00'}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x5a8) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={r3, 0x3}, 0x8) [ 125.507696] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b25/0x1d70 09:11:04 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x3, &(0x7f0000dc6ffe), &(0x7f0000904000)=0x4) [ 125.894157] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b25/0x1d70 09:11:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0xfffffffffffffffc, 0x0, {0x4, 0xe00000000015254}, [@nested={0x8, 0x9, [@generic='\n']}]}, 0x1c}}, 0x8000000000000) 09:11:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(sha3-224-generic,cbc-camellia-asm)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast6-avx\x00'}, 0x58) 09:11:04 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000400)={&(0x7f0000000200)=@ll, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/19, 0x13}, {0xffffffffffffffff}, {0x0}], 0x3, 0x0, 0x0, 0x5}, 0x21) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000007700)={0x18, 0x0, {0x5, @link_local, 'ip6gre0\x00'}}, 0x1e) ioctl(r0, 0x1ff, &(0x7f0000000600)="ba73e253da6d5403b6b62e430eb47707") epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x4000000000080003, 0x0) bind$packet(r2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f000000d180), 0x255, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='rdma.current\x00', 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) r3 = socket$inet6(0xa, 0x2000000802, 0x0) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r5 = socket$inet(0x10, 0x3, 0xc) sendmsg(r5, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000b0607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_int(r3, 0x29, 0x4d, &(0x7f0000000000)=0xfffffffffffffffe, 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000680)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000780)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x3000c00}, 0xc, &(0x7f0000000740)={&(0x7f00000007c0)=ANY=[@ANYBLOB="000229bd7000ffdbdf250a0000000c00020008000800010400000800060001000080340002000800040006000000080005000400000008000500e700000008000300030000000800070003000000080004000000000008000600030000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x20008000) unshare(0x40000000) r6 = socket$inet6(0xa, 0x4000000000003, 0x3a) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000500)={'syzkaller0\x00', {0x2, 0x4e22}}) setsockopt$inet6_int(r6, 0x29, 0xc8, &(0x7f00000004c0)=0xa, 0x38) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x1f, 0x1, 0x0, 0x80000000000004}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r6, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @remote}}, 0xb) 09:11:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0xfffffffffffffffc, 0x0, {0x4, 0xe00000000015254}, [@nested={0x8, 0x9, [@generic='\n']}]}, 0x1c}}, 0x8000000000000) 09:11:05 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000400)={&(0x7f0000000200)=@ll, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/19, 0x13}, {0xffffffffffffffff}, {0x0}], 0x3, 0x0, 0x0, 0x5}, 0x21) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000007700)={0x18, 0x0, {0x5, @link_local, 'ip6gre0\x00'}}, 0x1e) ioctl(r0, 0x1ff, &(0x7f0000000600)="ba73e253da6d5403b6b62e430eb47707") epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x4000000000080003, 0x0) bind$packet(r2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f000000d180), 0x255, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='rdma.current\x00', 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) r3 = socket$inet6(0xa, 0x2000000802, 0x0) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r5 = socket$inet(0x10, 0x3, 0xc) sendmsg(r5, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000b0607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_int(r3, 0x29, 0x4d, &(0x7f0000000000)=0xfffffffffffffffe, 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000680)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000780)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x3000c00}, 0xc, &(0x7f0000000740)={&(0x7f00000007c0)=ANY=[@ANYBLOB="000229bd7000ffdbdf250a0000000c00020008000800010400000800060001000080340002000800040006000000080005000400000008000500e700000008000300030000000800070003000000080004000000000008000600030000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x20008000) unshare(0x40000000) r6 = socket$inet6(0xa, 0x4000000000003, 0x3a) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000500)={'syzkaller0\x00', {0x2, 0x4e22}}) setsockopt$inet6_int(r6, 0x29, 0xc8, &(0x7f00000004c0)=0xa, 0x38) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x1f, 0x1, 0x0, 0x80000000000004}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r6, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @remote}}, 0xb) [ 126.380327] netlink: 'syz-executor0': attribute type 1 has an invalid length. 09:11:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(sha3-224-generic,cbc-camellia-asm)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast6-avx\x00'}, 0x58) [ 126.490504] netlink: 20 bytes leftover after parsing attributes in process `syz-executor0'. 09:11:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0xfffffffffffffffc, 0x0, {0x4, 0xe00000000015254}, [@nested={0x8, 0x9, [@generic='\n']}]}, 0x1c}}, 0x8000000000000) [ 126.605610] IPVS: ftp: loaded support on port[0] = 21 [ 126.622013] netlink: 'syz-executor3': attribute type 1 has an invalid length. 09:11:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(sha3-224-generic,cbc-camellia-asm)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast6-avx\x00'}, 0x58) [ 126.664492] netlink: 20 bytes leftover after parsing attributes in process `syz-executor3'. [ 126.834869] IPVS: ftp: loaded support on port[0] = 21 09:11:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(sha3-224-generic,cbc-camellia-asm)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast6-avx\x00'}, 0x58) 09:11:05 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000400)={&(0x7f0000000200)=@ll, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/19, 0x13}, {0xffffffffffffffff}, {0x0}], 0x3, 0x0, 0x0, 0x5}, 0x21) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000007700)={0x18, 0x0, {0x5, @link_local, 'ip6gre0\x00'}}, 0x1e) ioctl(r0, 0x1ff, &(0x7f0000000600)="ba73e253da6d5403b6b62e430eb47707") epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x4000000000080003, 0x0) bind$packet(r2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f000000d180), 0x255, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='rdma.current\x00', 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) r3 = socket$inet6(0xa, 0x2000000802, 0x0) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r5 = socket$inet(0x10, 0x3, 0xc) sendmsg(r5, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000b0607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_int(r3, 0x29, 0x4d, &(0x7f0000000000)=0xfffffffffffffffe, 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000680)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000780)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x3000c00}, 0xc, &(0x7f0000000740)={&(0x7f00000007c0)=ANY=[@ANYBLOB="000229bd7000ffdbdf250a0000000c00020008000800010400000800060001000080340002000800040006000000080005000400000008000500e700000008000300030000000800070003000000080004000000000008000600030000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x20008000) unshare(0x40000000) r6 = socket$inet6(0xa, 0x4000000000003, 0x3a) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000500)={'syzkaller0\x00', {0x2, 0x4e22}}) setsockopt$inet6_int(r6, 0x29, 0xc8, &(0x7f00000004c0)=0xa, 0x38) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x1f, 0x1, 0x0, 0x80000000000004}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r6, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @remote}}, 0xb) 09:11:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0xfffffffffffffffc, 0x0, {0x4, 0xe00000000015254}, [@nested={0x8, 0x9, [@generic='\n']}]}, 0x1c}}, 0x8000000000000) 09:11:05 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x9c}, 0x10) 09:11:05 executing program 1: r0 = socket$nl_generic(0xa, 0x3, 0x10) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a7c2d023c126285718070") setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x22, &(0x7f0000000040)={0x800000000000001, 0x40000000020000, 0x1}, 0x10) 09:11:05 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x9c}, 0x10) [ 127.126608] netlink: 'syz-executor5': attribute type 1 has an invalid length. [ 127.134145] netlink: 20 bytes leftover after parsing attributes in process `syz-executor5'. [ 127.199793] IPVS: ftp: loaded support on port[0] = 21 09:11:07 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000400)={&(0x7f0000000200)=@ll, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/19, 0x13}, {0xffffffffffffffff}, {0x0}], 0x3, 0x0, 0x0, 0x5}, 0x21) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000007700)={0x18, 0x0, {0x5, @link_local, 'ip6gre0\x00'}}, 0x1e) ioctl(r0, 0x1ff, &(0x7f0000000600)="ba73e253da6d5403b6b62e430eb47707") epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x4000000000080003, 0x0) bind$packet(r2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f000000d180), 0x255, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='rdma.current\x00', 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) r3 = socket$inet6(0xa, 0x2000000802, 0x0) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r5 = socket$inet(0x10, 0x3, 0xc) sendmsg(r5, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000b0607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_int(r3, 0x29, 0x4d, &(0x7f0000000000)=0xfffffffffffffffe, 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000680)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000780)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x3000c00}, 0xc, &(0x7f0000000740)={&(0x7f00000007c0)=ANY=[@ANYBLOB="000229bd7000ffdbdf250a0000000c00020008000800010400000800060001000080340002000800040006000000080005000400000008000500e700000008000300030000000800070003000000080004000000000008000600030000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x20008000) unshare(0x40000000) r6 = socket$inet6(0xa, 0x4000000000003, 0x3a) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000500)={'syzkaller0\x00', {0x2, 0x4e22}}) setsockopt$inet6_int(r6, 0x29, 0xc8, &(0x7f00000004c0)=0xa, 0x38) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x1f, 0x1, 0x0, 0x80000000000004}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r6, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @remote}}, 0xb) 09:11:07 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x9c}, 0x10) 09:11:07 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)="2e2f6367726f757000ec925d0e43d2dee1d4e7867e49fe6f8beb2285ebff76c6482eadeec5e7f9cf08e473adb1458001a308cb4f6890be6e66e020d20360d008c2bcca208281634e9c083bba958812280806afdbef0bec7050c66a27f9dfca9e83bd5f685f4402bf14f8fd4ea270b75ea784457e1582cf427c32096f9ece709449b92970545945e439711591ab7ecb673725b002092187ef6db2e8a11d6725c4865855c630fb9c90c1c2262733ca213c759acf972ade7f61024cb074a065dd3fb1409d56d9104238e44d980333d7a57c86ffae5a6279e4d73376d6c3749cb826d2164ac4aee1a787491e80115ccaceb091d509de92570e24a1f7c1f069e577ef811fd111483caf80a31cf51399d485ce20c5cd55a704ed0b9f1d9a29bb74209a53eb06797346cc4799f190986b144a166451bc78d06d184c9ba2d59c92bdc632a98870c0726c9d53dfa9ea311e3176412c1c16f14bb9e0940642e7a7bde73577e0b1f136", 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r0, 0xa, 0x1, 0x0, &(0x7f0000000000), 0x8e}, 0x20) 09:11:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f00000000c0), 0x1) 09:11:07 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000400)={&(0x7f0000000200)=@ll, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/19, 0x13}, {0xffffffffffffffff}, {0x0}], 0x3, 0x0, 0x0, 0x5}, 0x21) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000007700)={0x18, 0x0, {0x5, @link_local, 'ip6gre0\x00'}}, 0x1e) ioctl(r0, 0x1ff, &(0x7f0000000600)="ba73e253da6d5403b6b62e430eb47707") epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x4000000000080003, 0x0) bind$packet(r2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f000000d180), 0x255, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='rdma.current\x00', 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) r3 = socket$inet6(0xa, 0x2000000802, 0x0) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r5 = socket$inet(0x10, 0x3, 0xc) sendmsg(r5, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000b0607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_int(r3, 0x29, 0x4d, &(0x7f0000000000)=0xfffffffffffffffe, 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000680)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000780)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x3000c00}, 0xc, &(0x7f0000000740)={&(0x7f00000007c0)=ANY=[@ANYBLOB="000229bd7000ffdbdf250a0000000c00020008000800010400000800060001000080340002000800040006000000080005000400000008000500e700000008000300030000000800070003000000080004000000000008000600030000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x20008000) unshare(0x40000000) r6 = socket$inet6(0xa, 0x4000000000003, 0x3a) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000500)={'syzkaller0\x00', {0x2, 0x4e22}}) setsockopt$inet6_int(r6, 0x29, 0xc8, &(0x7f00000004c0)=0xa, 0x38) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x1f, 0x1, 0x0, 0x80000000000004}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r6, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @remote}}, 0xb) 09:11:07 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000400)={&(0x7f0000000200)=@ll, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/19, 0x13}, {0xffffffffffffffff}, {0x0}], 0x3, 0x0, 0x0, 0x5}, 0x21) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000007700)={0x18, 0x0, {0x5, @link_local, 'ip6gre0\x00'}}, 0x1e) ioctl(r0, 0x1ff, &(0x7f0000000600)="ba73e253da6d5403b6b62e430eb47707") epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x4000000000080003, 0x0) bind$packet(r2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f000000d180), 0x255, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='rdma.current\x00', 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) r3 = socket$inet6(0xa, 0x2000000802, 0x0) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r5 = socket$inet(0x10, 0x3, 0xc) sendmsg(r5, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000b0607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_int(r3, 0x29, 0x4d, &(0x7f0000000000)=0xfffffffffffffffe, 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000680)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000780)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x3000c00}, 0xc, &(0x7f0000000740)={&(0x7f00000007c0)=ANY=[@ANYBLOB="000229bd7000ffdbdf250a0000000c00020008000800010400000800060001000080340002000800040006000000080005000400000008000500e700000008000300030000000800070003000000080004000000000008000600030000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x20008000) unshare(0x40000000) r6 = socket$inet6(0xa, 0x4000000000003, 0x3a) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000500)={'syzkaller0\x00', {0x2, 0x4e22}}) setsockopt$inet6_int(r6, 0x29, 0xc8, &(0x7f00000004c0)=0xa, 0x38) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x1f, 0x1, 0x0, 0x80000000000004}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r6, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @remote}}, 0xb) 09:11:07 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x9c}, 0x10) 09:11:08 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)="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", 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r0, 0xa, 0x1, 0x0, &(0x7f0000000000), 0x8e}, 0x20) 09:11:08 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f00000000c0), 0x1) [ 129.349323] netlink: 'syz-executor5': attribute type 1 has an invalid length. [ 129.383199] netlink: 'syz-executor3': attribute type 1 has an invalid length. 09:11:08 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)="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", 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r0, 0xa, 0x1, 0x0, &(0x7f0000000000), 0x8e}, 0x20) 09:11:08 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000580)={&(0x7f0000000200), 0xc, &(0x7f0000000540)={&(0x7f0000000240)=@newae={0x5c, 0x1e, 0x1, 0x0, 0x0, {}, [@replay_esn_val={0x1c}]}, 0x5c}}, 0x0) [ 129.408622] netlink: 'syz-executor0': attribute type 1 has an invalid length. [ 129.418361] netlink: 20 bytes leftover after parsing attributes in process `syz-executor3'. [ 129.443413] netlink: 20 bytes leftover after parsing attributes in process `syz-executor5'. 09:11:08 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f00000000c0), 0x1) [ 129.478956] netlink: 20 bytes leftover after parsing attributes in process `syz-executor0'. [ 129.486356] IPVS: ftp: loaded support on port[0] = 21 [ 129.511370] IPVS: ftp: loaded support on port[0] = 21 [ 129.542489] IPVS: ftp: loaded support on port[0] = 21 09:11:11 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000400)={&(0x7f0000000200)=@ll, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/19, 0x13}, {0xffffffffffffffff}, {0x0}], 0x3, 0x0, 0x0, 0x5}, 0x21) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000007700)={0x18, 0x0, {0x5, @link_local, 'ip6gre0\x00'}}, 0x1e) ioctl(r0, 0x1ff, &(0x7f0000000600)="ba73e253da6d5403b6b62e430eb47707") epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x4000000000080003, 0x0) bind$packet(r2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f000000d180), 0x255, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='rdma.current\x00', 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) r3 = socket$inet6(0xa, 0x2000000802, 0x0) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r5 = socket$inet(0x10, 0x3, 0xc) sendmsg(r5, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000b0607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_int(r3, 0x29, 0x4d, &(0x7f0000000000)=0xfffffffffffffffe, 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000680)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000780)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x3000c00}, 0xc, &(0x7f0000000740)={&(0x7f00000007c0)=ANY=[@ANYBLOB="000229bd7000ffdbdf250a0000000c00020008000800010400000800060001000080340002000800040006000000080005000400000008000500e700000008000300030000000800070003000000080004000000000008000600030000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x20008000) unshare(0x40000000) r6 = socket$inet6(0xa, 0x4000000000003, 0x3a) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000500)={'syzkaller0\x00', {0x2, 0x4e22}}) setsockopt$inet6_int(r6, 0x29, 0xc8, &(0x7f00000004c0)=0xa, 0x38) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x1f, 0x1, 0x0, 0x80000000000004}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r6, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @remote}}, 0xb) 09:11:11 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)="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", 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r0, 0xa, 0x1, 0x0, &(0x7f0000000000), 0x8e}, 0x20) 09:11:11 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000580)={&(0x7f0000000200), 0xc, &(0x7f0000000540)={&(0x7f0000000240)=@newae={0x5c, 0x1e, 0x1, 0x0, 0x0, {}, [@replay_esn_val={0x1c}]}, 0x5c}}, 0x0) 09:11:11 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f00000000c0), 0x1) 09:11:11 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000400)={&(0x7f0000000200)=@ll, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/19, 0x13}, {0xffffffffffffffff}, {0x0}], 0x3, 0x0, 0x0, 0x5}, 0x21) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000007700)={0x18, 0x0, {0x5, @link_local, 'ip6gre0\x00'}}, 0x1e) ioctl(r0, 0x1ff, &(0x7f0000000600)="ba73e253da6d5403b6b62e430eb47707") epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x4000000000080003, 0x0) bind$packet(r2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f000000d180), 0x255, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='rdma.current\x00', 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) r3 = socket$inet6(0xa, 0x2000000802, 0x0) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r5 = socket$inet(0x10, 0x3, 0xc) sendmsg(r5, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000b0607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_int(r3, 0x29, 0x4d, &(0x7f0000000000)=0xfffffffffffffffe, 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000680)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000780)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x3000c00}, 0xc, &(0x7f0000000740)={&(0x7f00000007c0)=ANY=[@ANYBLOB="000229bd7000ffdbdf250a0000000c00020008000800010400000800060001000080340002000800040006000000080005000400000008000500e700000008000300030000000800070003000000080004000000000008000600030000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x20008000) unshare(0x40000000) r6 = socket$inet6(0xa, 0x4000000000003, 0x3a) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000500)={'syzkaller0\x00', {0x2, 0x4e22}}) setsockopt$inet6_int(r6, 0x29, 0xc8, &(0x7f00000004c0)=0xa, 0x38) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x1f, 0x1, 0x0, 0x80000000000004}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r6, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @remote}}, 0xb) [ 132.600769] netlink: 'syz-executor3': attribute type 1 has an invalid length. [ 132.653768] netlink: 20 bytes leftover after parsing attributes in process `syz-executor3'. [ 132.671906] netlink: 'syz-executor0': attribute type 1 has an invalid length. [ 132.679256] netlink: 20 bytes leftover after parsing attributes in process `syz-executor0'. [ 132.710260] IPVS: ftp: loaded support on port[0] = 21 [ 132.748168] IPVS: ftp: loaded support on port[0] = 21 09:11:11 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000400)={&(0x7f0000000200)=@ll, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/19, 0x13}, {0xffffffffffffffff}, {0x0}], 0x3, 0x0, 0x0, 0x5}, 0x21) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000007700)={0x18, 0x0, {0x5, @link_local, 'ip6gre0\x00'}}, 0x1e) ioctl(r0, 0x1ff, &(0x7f0000000600)="ba73e253da6d5403b6b62e430eb47707") epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x4000000000080003, 0x0) bind$packet(r2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f000000d180), 0x255, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='rdma.current\x00', 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) r3 = socket$inet6(0xa, 0x2000000802, 0x0) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r5 = socket$inet(0x10, 0x3, 0xc) sendmsg(r5, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000b0607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_int(r3, 0x29, 0x4d, &(0x7f0000000000)=0xfffffffffffffffe, 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000680)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000780)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x3000c00}, 0xc, &(0x7f0000000740)={&(0x7f00000007c0)=ANY=[@ANYBLOB="000229bd7000ffdbdf250a0000000c00020008000800010400000800060001000080340002000800040006000000080005000400000008000500e700000008000300030000000800070003000000080004000000000008000600030000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x20008000) unshare(0x40000000) r6 = socket$inet6(0xa, 0x4000000000003, 0x3a) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000500)={'syzkaller0\x00', {0x2, 0x4e22}}) setsockopt$inet6_int(r6, 0x29, 0xc8, &(0x7f00000004c0)=0xa, 0x38) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x1f, 0x1, 0x0, 0x80000000000004}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r6, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @remote}}, 0xb) 09:11:11 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply}}}}, 0x0) 09:11:11 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000580)={&(0x7f0000000200), 0xc, &(0x7f0000000540)={&(0x7f0000000240)=@newae={0x5c, 0x1e, 0x1, 0x0, 0x0, {}, [@replay_esn_val={0x1c}]}, 0x5c}}, 0x0) 09:11:11 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000016c0)={{{@in6=@local, @in=@loopback}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') r3 = socket$inet6(0xa, 0x400000, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'team0\x00', 0xd800}) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, &(0x7f00000003c0)={0x2, {{0xa, 0x0, 0x1, @mcast1, 0xffffffffffffffff}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000540)=ANY=[], 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) r5 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r5, 0x89f2, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="1a00000048090000ff01001b040000000200000000000000000000002ce0117c05006e0004000000fc7a0000000000007148"]}) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) r7 = socket$inet6(0xa, 0x2, 0x2000009) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r7, 0x84, 0x13, &(0x7f0000000100), 0xfffffffffffffea6) getsockopt$bt_l2cap_L2CAP_CONNINFO(r6, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x6) setsockopt$netlink_NETLINK_CAP_ACK(r5, 0x10e, 0xa, &(0x7f0000000140)=0x49, 0x4) ioctl(r4, 0x8912, &(0x7f00000000c0)="0a5cc80700315f85715070f5ba914d5b9fbd8015889f91c4f72544832cdba6734a7c41c725d83aa5a1d7b7707f16d353bef0f4762c235eea8289ec5753ac9cc37f5e51ddad28bf92e18651ca5ddfdbd7c16ec91912761158994d382344a4646e2fa9f202971cef1c02f7e59055ccb8b0376f9188f8f0dc7fc802addc1aa84de736fb8d6cdbc14e5829133ef5963403f42a448253fb07503b884646dd2ff99d1ce677ff8afd536090188ae7c6542201f03db4d9457dfc33c51c96a9397c030c8fc29676690f6a5a32f3c6688789b608dee06325ee12f40ca0ceb9e63df60abcff61593cba56b13d5030563e0e01b950af4f20aeba88a4de9c") ioctl$sock_SIOCINQ(r3, 0x541b, &(0x7f0000000800)) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) accept4$llc(r8, &(0x7f0000000780)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000007c0)=0x10, 0x80000) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1) getsockname(r4, &(0x7f00000006c0)=@hci, &(0x7f0000000740)=0x80) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000f40)="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") getsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f00000002c0)=""/254, &(0x7f0000000040)=0xfe) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x62811041}, 0xc, &(0x7f0000000100)={&(0x7f00000005c0)={0xa8, r2, 0xc08, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @rand_addr=0x6}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7f1b3246}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7fffffff}]}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2b}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2c}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x16}, @IPVS_SVC_ATTR_PROTOCOL={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x4}]}, 0xa8}, 0x1, 0x0, 0x0, 0x80}, 0x841) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0xd44c}) getpeername$packet(r0, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) write$cgroup_int(r0, &(0x7f0000000080), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xfffffcdd) 09:11:11 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply}}}}, 0x0) 09:11:11 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000580)={&(0x7f0000000200), 0xc, &(0x7f0000000540)={&(0x7f0000000240)=@newae={0x5c, 0x1e, 0x1, 0x0, 0x0, {}, [@replay_esn_val={0x1c}]}, 0x5c}}, 0x0) 09:11:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={"626f6e645f736c6176655f3000000001"}) [ 133.072883] netlink: 'syz-executor5': attribute type 1 has an invalid length. [ 133.107667] netlink: 20 bytes leftover after parsing attributes in process `syz-executor5'. [ 133.177983] IPVS: ftp: loaded support on port[0] = 21 [ 133.381992] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 133.405189] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 133.513825] syz-executor1 (8289) used greatest stack depth: 12448 bytes left [ 133.741220] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:11:13 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000016c0)={{{@in6=@local, @in=@loopback}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') r3 = socket$inet6(0xa, 0x400000, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'team0\x00', 0xd800}) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, &(0x7f00000003c0)={0x2, {{0xa, 0x0, 0x1, @mcast1, 0xffffffffffffffff}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000540)=ANY=[], 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) r5 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r5, 0x89f2, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="1a00000048090000ff01001b040000000200000000000000000000002ce0117c05006e0004000000fc7a0000000000007148"]}) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) r7 = socket$inet6(0xa, 0x2, 0x2000009) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r7, 0x84, 0x13, &(0x7f0000000100), 0xfffffffffffffea6) getsockopt$bt_l2cap_L2CAP_CONNINFO(r6, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x6) setsockopt$netlink_NETLINK_CAP_ACK(r5, 0x10e, 0xa, &(0x7f0000000140)=0x49, 0x4) ioctl(r4, 0x8912, &(0x7f00000000c0)="0a5cc80700315f85715070f5ba914d5b9fbd8015889f91c4f72544832cdba6734a7c41c725d83aa5a1d7b7707f16d353bef0f4762c235eea8289ec5753ac9cc37f5e51ddad28bf92e18651ca5ddfdbd7c16ec91912761158994d382344a4646e2fa9f202971cef1c02f7e59055ccb8b0376f9188f8f0dc7fc802addc1aa84de736fb8d6cdbc14e5829133ef5963403f42a448253fb07503b884646dd2ff99d1ce677ff8afd536090188ae7c6542201f03db4d9457dfc33c51c96a9397c030c8fc29676690f6a5a32f3c6688789b608dee06325ee12f40ca0ceb9e63df60abcff61593cba56b13d5030563e0e01b950af4f20aeba88a4de9c") ioctl$sock_SIOCINQ(r3, 0x541b, &(0x7f0000000800)) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) accept4$llc(r8, &(0x7f0000000780)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000007c0)=0x10, 0x80000) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1) getsockname(r4, &(0x7f00000006c0)=@hci, &(0x7f0000000740)=0x80) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000f40)="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") getsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f00000002c0)=""/254, &(0x7f0000000040)=0xfe) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x62811041}, 0xc, &(0x7f0000000100)={&(0x7f00000005c0)={0xa8, r2, 0xc08, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @rand_addr=0x6}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7f1b3246}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7fffffff}]}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2b}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2c}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x16}, @IPVS_SVC_ATTR_PROTOCOL={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x4}]}, 0xa8}, 0x1, 0x0, 0x0, 0x80}, 0x841) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0xd44c}) getpeername$packet(r0, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) write$cgroup_int(r0, &(0x7f0000000080), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xfffffcdd) 09:11:13 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply}}}}, 0x0) 09:11:13 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000016c0)={{{@in6=@local, @in=@loopback}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') r3 = socket$inet6(0xa, 0x400000, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'team0\x00', 0xd800}) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, &(0x7f00000003c0)={0x2, {{0xa, 0x0, 0x1, @mcast1, 0xffffffffffffffff}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000540)=ANY=[], 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) r5 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r5, 0x89f2, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="1a00000048090000ff01001b040000000200000000000000000000002ce0117c05006e0004000000fc7a0000000000007148"]}) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) r7 = socket$inet6(0xa, 0x2, 0x2000009) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r7, 0x84, 0x13, &(0x7f0000000100), 0xfffffffffffffea6) getsockopt$bt_l2cap_L2CAP_CONNINFO(r6, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x6) setsockopt$netlink_NETLINK_CAP_ACK(r5, 0x10e, 0xa, &(0x7f0000000140)=0x49, 0x4) ioctl(r4, 0x8912, &(0x7f00000000c0)="0a5cc80700315f85715070f5ba914d5b9fbd8015889f91c4f72544832cdba6734a7c41c725d83aa5a1d7b7707f16d353bef0f4762c235eea8289ec5753ac9cc37f5e51ddad28bf92e18651ca5ddfdbd7c16ec91912761158994d382344a4646e2fa9f202971cef1c02f7e59055ccb8b0376f9188f8f0dc7fc802addc1aa84de736fb8d6cdbc14e5829133ef5963403f42a448253fb07503b884646dd2ff99d1ce677ff8afd536090188ae7c6542201f03db4d9457dfc33c51c96a9397c030c8fc29676690f6a5a32f3c6688789b608dee06325ee12f40ca0ceb9e63df60abcff61593cba56b13d5030563e0e01b950af4f20aeba88a4de9c") ioctl$sock_SIOCINQ(r3, 0x541b, &(0x7f0000000800)) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) accept4$llc(r8, &(0x7f0000000780)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000007c0)=0x10, 0x80000) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1) getsockname(r4, &(0x7f00000006c0)=@hci, &(0x7f0000000740)=0x80) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000f40)="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") getsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f00000002c0)=""/254, &(0x7f0000000040)=0xfe) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x62811041}, 0xc, &(0x7f0000000100)={&(0x7f00000005c0)={0xa8, r2, 0xc08, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @rand_addr=0x6}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7f1b3246}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7fffffff}]}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2b}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2c}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x16}, @IPVS_SVC_ATTR_PROTOCOL={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x4}]}, 0xa8}, 0x1, 0x0, 0x0, 0x80}, 0x841) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0xd44c}) getpeername$packet(r0, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) write$cgroup_int(r0, &(0x7f0000000080), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xfffffcdd) 09:11:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={"626f6e645f736c6176655f3000000001"}) 09:11:13 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000013, &(0x7f00000000c0)=0xb53, 0x4) 09:11:13 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8dab}]}, 0x10) sendto$inet6(r1, &(0x7f0000000300), 0x0, 0x4008080, 0x0, 0x0) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x4000000000000000) 09:11:14 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply}}}}, 0x0) [ 135.265345] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:11:14 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000013, &(0x7f00000000c0)=0xb53, 0x4) 09:11:14 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000013, &(0x7f00000000c0)=0xb53, 0x4) 09:11:14 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x4) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000080)={r0}) 09:11:14 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000013, &(0x7f00000000c0)=0xb53, 0x4) 09:11:14 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x4) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000080)={r0}) 09:11:14 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000016c0)={{{@in6=@local, @in=@loopback}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') r3 = socket$inet6(0xa, 0x400000, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'team0\x00', 0xd800}) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, &(0x7f00000003c0)={0x2, {{0xa, 0x0, 0x1, @mcast1, 0xffffffffffffffff}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000540)=ANY=[], 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) r5 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r5, 0x89f2, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="1a00000048090000ff01001b040000000200000000000000000000002ce0117c05006e0004000000fc7a0000000000007148"]}) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) r7 = socket$inet6(0xa, 0x2, 0x2000009) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r7, 0x84, 0x13, &(0x7f0000000100), 0xfffffffffffffea6) getsockopt$bt_l2cap_L2CAP_CONNINFO(r6, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x6) setsockopt$netlink_NETLINK_CAP_ACK(r5, 0x10e, 0xa, &(0x7f0000000140)=0x49, 0x4) ioctl(r4, 0x8912, &(0x7f00000000c0)="0a5cc80700315f85715070f5ba914d5b9fbd8015889f91c4f72544832cdba6734a7c41c725d83aa5a1d7b7707f16d353bef0f4762c235eea8289ec5753ac9cc37f5e51ddad28bf92e18651ca5ddfdbd7c16ec91912761158994d382344a4646e2fa9f202971cef1c02f7e59055ccb8b0376f9188f8f0dc7fc802addc1aa84de736fb8d6cdbc14e5829133ef5963403f42a448253fb07503b884646dd2ff99d1ce677ff8afd536090188ae7c6542201f03db4d9457dfc33c51c96a9397c030c8fc29676690f6a5a32f3c6688789b608dee06325ee12f40ca0ceb9e63df60abcff61593cba56b13d5030563e0e01b950af4f20aeba88a4de9c") ioctl$sock_SIOCINQ(r3, 0x541b, &(0x7f0000000800)) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) accept4$llc(r8, &(0x7f0000000780)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000007c0)=0x10, 0x80000) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1) getsockname(r4, &(0x7f00000006c0)=@hci, &(0x7f0000000740)=0x80) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000f40)="d2a26edb55565fa7e85a5909f454bcf31191f1efa06e93c3bc48c456d5b33006fea2b7af74a5c409024f3219db74e9604510142ce7c6d7494f484f11b642eaf1b65d200d9bdb629b53b7a39b27d3e732311c809de2f2908c905eeb694115096800000080000080000000000000008a33c722a2eb8eacf5d32933ddb05cefaa7e69148639f8da528f4f0217c67e8c0fd27cd0af8fa34c1c23c0501b1d23a26b42e1976674a8d739739d8ff46694415e457727554f282fecf1a01b5012a3f652e51ae4037189028c8e36242de152c34316276145195cc385c65275682279c639204500be3faa5bcd45ad3600000000000000ce9ac3a32e01e493f622ab00") getsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f00000002c0)=""/254, &(0x7f0000000040)=0xfe) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x62811041}, 0xc, &(0x7f0000000100)={&(0x7f00000005c0)={0xa8, r2, 0xc08, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @rand_addr=0x6}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7f1b3246}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7fffffff}]}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2b}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2c}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x16}, @IPVS_SVC_ATTR_PROTOCOL={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x4}]}, 0xa8}, 0x1, 0x0, 0x0, 0x80}, 0x841) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0xd44c}) getpeername$packet(r0, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) write$cgroup_int(r0, &(0x7f0000000080), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xfffffcdd) 09:11:14 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x4) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000080)={r0}) 09:11:14 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000016c0)={{{@in6=@local, @in=@loopback}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') r3 = socket$inet6(0xa, 0x400000, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'team0\x00', 0xd800}) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, &(0x7f00000003c0)={0x2, {{0xa, 0x0, 0x1, @mcast1, 0xffffffffffffffff}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000540)=ANY=[], 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) r5 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r5, 0x89f2, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="1a00000048090000ff01001b040000000200000000000000000000002ce0117c05006e0004000000fc7a0000000000007148"]}) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) r7 = socket$inet6(0xa, 0x2, 0x2000009) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r7, 0x84, 0x13, &(0x7f0000000100), 0xfffffffffffffea6) getsockopt$bt_l2cap_L2CAP_CONNINFO(r6, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x6) setsockopt$netlink_NETLINK_CAP_ACK(r5, 0x10e, 0xa, &(0x7f0000000140)=0x49, 0x4) ioctl(r4, 0x8912, &(0x7f00000000c0)="0a5cc80700315f85715070f5ba914d5b9fbd8015889f91c4f72544832cdba6734a7c41c725d83aa5a1d7b7707f16d353bef0f4762c235eea8289ec5753ac9cc37f5e51ddad28bf92e18651ca5ddfdbd7c16ec91912761158994d382344a4646e2fa9f202971cef1c02f7e59055ccb8b0376f9188f8f0dc7fc802addc1aa84de736fb8d6cdbc14e5829133ef5963403f42a448253fb07503b884646dd2ff99d1ce677ff8afd536090188ae7c6542201f03db4d9457dfc33c51c96a9397c030c8fc29676690f6a5a32f3c6688789b608dee06325ee12f40ca0ceb9e63df60abcff61593cba56b13d5030563e0e01b950af4f20aeba88a4de9c") ioctl$sock_SIOCINQ(r3, 0x541b, &(0x7f0000000800)) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) accept4$llc(r8, &(0x7f0000000780)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000007c0)=0x10, 0x80000) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1) getsockname(r4, &(0x7f00000006c0)=@hci, &(0x7f0000000740)=0x80) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000f40)="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") getsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f00000002c0)=""/254, &(0x7f0000000040)=0xfe) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x62811041}, 0xc, &(0x7f0000000100)={&(0x7f00000005c0)={0xa8, r2, 0xc08, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @rand_addr=0x6}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7f1b3246}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7fffffff}]}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2b}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2c}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x16}, @IPVS_SVC_ATTR_PROTOCOL={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x4}]}, 0xa8}, 0x1, 0x0, 0x0, 0x80}, 0x841) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0xd44c}) getpeername$packet(r0, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) write$cgroup_int(r0, &(0x7f0000000080), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xfffffcdd) 09:11:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={"626f6e645f736c6176655f3000000001"}) 09:11:14 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) close(r0) [ 136.140846] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:11:15 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8dab}]}, 0x10) sendto$inet6(r1, &(0x7f0000000300), 0x0, 0x4008080, 0x0, 0x0) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x4000000000000000) 09:11:15 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x4) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000080)={r0}) 09:11:15 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) close(r0) 09:11:15 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000016c0)={{{@in6=@local, @in=@loopback}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') r3 = socket$inet6(0xa, 0x400000, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'team0\x00', 0xd800}) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, &(0x7f00000003c0)={0x2, {{0xa, 0x0, 0x1, @mcast1, 0xffffffffffffffff}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000540)=ANY=[], 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) r5 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r5, 0x89f2, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="1a00000048090000ff01001b040000000200000000000000000000002ce0117c05006e0004000000fc7a0000000000007148"]}) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) r7 = socket$inet6(0xa, 0x2, 0x2000009) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r7, 0x84, 0x13, &(0x7f0000000100), 0xfffffffffffffea6) getsockopt$bt_l2cap_L2CAP_CONNINFO(r6, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x6) setsockopt$netlink_NETLINK_CAP_ACK(r5, 0x10e, 0xa, &(0x7f0000000140)=0x49, 0x4) ioctl(r4, 0x8912, &(0x7f00000000c0)="0a5cc80700315f85715070f5ba914d5b9fbd8015889f91c4f72544832cdba6734a7c41c725d83aa5a1d7b7707f16d353bef0f4762c235eea8289ec5753ac9cc37f5e51ddad28bf92e18651ca5ddfdbd7c16ec91912761158994d382344a4646e2fa9f202971cef1c02f7e59055ccb8b0376f9188f8f0dc7fc802addc1aa84de736fb8d6cdbc14e5829133ef5963403f42a448253fb07503b884646dd2ff99d1ce677ff8afd536090188ae7c6542201f03db4d9457dfc33c51c96a9397c030c8fc29676690f6a5a32f3c6688789b608dee06325ee12f40ca0ceb9e63df60abcff61593cba56b13d5030563e0e01b950af4f20aeba88a4de9c") ioctl$sock_SIOCINQ(r3, 0x541b, &(0x7f0000000800)) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) accept4$llc(r8, &(0x7f0000000780)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000007c0)=0x10, 0x80000) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f0000000b40)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff010000000000000000000000000001000000000000000000000000000000000000b173205f0000000000000000000000000000000000000000000000a27f5a3a0000ce103f3984f8a76a16715d6d0000000000000000000000000000000073777b805fdbffb43aa24300000000000000000000000000000000000000000000000000000000000000000000000000000000000000d136a14a03c6a5fa716869b8693a71eb90b4292c6ae9945ae47aa3e017968212e1809d42f70fd35f57722a38a58303b8c0ca1bf0ea3be47c9bc04a56140ed88fcb1a24b9842c60c1316448cf6b801568c859247430f785153c8e18b57c0617dd0a9119ff50134e3fd7597afd3a9037c76ced322d98b00932ecdd87265b6be2fb202c0a6c4700000000000000000000000093311177881505de50e647a6eb7d2a9d37ff79d93d15d57d8c5cb62ff33cb3f20a401a5c22353d7319f0d9c9000000000100000082279030390d3e6b3fc5eae813a0f31c450e7c54e4940ac79096cc8b74db4b5638c299c0f7783c2b3c40034ada2572393881cba0b11e295a79b3cdc60bc5537f2ea900cf0ea7dbfbe43b2bfc062fe6ca6d650d0a47f1df0e172ac3da4494ee71f07d5f67a5ffc8303a1e2d777f2a9ef0b07879fa8c1a44c4d168624f98635ff519446bb30000000000000000388f35a41d6fdc386e8db3c607b9a90ceacda57dfafe411c6e099edd7f05be8c1d03356281cb558e75db85a477c3d39a315be8152235eb6e32ff1a6460a377fa05244b1ce1c869e500796241d46ecf17dad52d7b4ea8b48781af9b96a947b50fcd9d00b8327fb37a7190fdff2190925643f6f364e6a1efb3629bce2fd88c0db09658096fb2f6c3e9732bfc6b21495dab1e837cf1c13ee6b4bafa88970021f8b09ed5a0c970dbe0bf9797c42f5e05a94d9cf7"], 0x1) getsockname(r4, &(0x7f00000006c0)=@hci, &(0x7f0000000740)=0x80) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000f40)="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") getsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f00000002c0)=""/254, &(0x7f0000000040)=0xfe) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x62811041}, 0xc, &(0x7f0000000100)={&(0x7f00000005c0)={0xa8, r2, 0xc08, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @rand_addr=0x6}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7f1b3246}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7fffffff}]}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2b}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2c}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x16}, @IPVS_SVC_ATTR_PROTOCOL={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x4}]}, 0xa8}, 0x1, 0x0, 0x0, 0x80}, 0x841) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0xd44c}) getpeername$packet(r0, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) write$cgroup_int(r0, &(0x7f0000000080), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xfffffcdd) 09:11:15 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000016c0)={{{@in6=@local, @in=@loopback}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') r3 = socket$inet6(0xa, 0x400000, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'team0\x00', 0xd800}) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, &(0x7f00000003c0)={0x2, {{0xa, 0x0, 0x1, @mcast1, 0xffffffffffffffff}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000540)=ANY=[], 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) r5 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r5, 0x89f2, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="1a00000048090000ff01001b040000000200000000000000000000002ce0117c05006e0004000000fc7a0000000000007148"]}) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) r7 = socket$inet6(0xa, 0x2, 0x2000009) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r7, 0x84, 0x13, &(0x7f0000000100), 0xfffffffffffffea6) getsockopt$bt_l2cap_L2CAP_CONNINFO(r6, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x6) setsockopt$netlink_NETLINK_CAP_ACK(r5, 0x10e, 0xa, &(0x7f0000000140)=0x49, 0x4) ioctl(r4, 0x8912, &(0x7f00000000c0)="0a5cc80700315f85715070f5ba914d5b9fbd8015889f91c4f72544832cdba6734a7c41c725d83aa5a1d7b7707f16d353bef0f4762c235eea8289ec5753ac9cc37f5e51ddad28bf92e18651ca5ddfdbd7c16ec91912761158994d382344a4646e2fa9f202971cef1c02f7e59055ccb8b0376f9188f8f0dc7fc802addc1aa84de736fb8d6cdbc14e5829133ef5963403f42a448253fb07503b884646dd2ff99d1ce677ff8afd536090188ae7c6542201f03db4d9457dfc33c51c96a9397c030c8fc29676690f6a5a32f3c6688789b608dee06325ee12f40ca0ceb9e63df60abcff61593cba56b13d5030563e0e01b950af4f20aeba88a4de9c") ioctl$sock_SIOCINQ(r3, 0x541b, &(0x7f0000000800)) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) accept4$llc(r8, &(0x7f0000000780)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000007c0)=0x10, 0x80000) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1) getsockname(r4, &(0x7f00000006c0)=@hci, &(0x7f0000000740)=0x80) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000f40)="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") getsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f00000002c0)=""/254, &(0x7f0000000040)=0xfe) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x62811041}, 0xc, &(0x7f0000000100)={&(0x7f00000005c0)={0xa8, r2, 0xc08, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @rand_addr=0x6}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7f1b3246}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7fffffff}]}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2b}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2c}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x16}, @IPVS_SVC_ATTR_PROTOCOL={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x4}]}, 0xa8}, 0x1, 0x0, 0x0, 0x80}, 0x841) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0xd44c}) getpeername$packet(r0, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) write$cgroup_int(r0, &(0x7f0000000080), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xfffffcdd) 09:11:15 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@remote}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000140)={@dev}, 0x14) syz_emit_ethernet(0x3e, &(0x7f0000001180)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b7e720", 0x8, 0x3a, 0x0, @local, @local={0xfe, 0x80, [0x3]}, {[], @icmpv6=@echo_request}}}}}, 0x0) 09:11:15 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) close(r0) 09:11:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={"626f6e645f736c6176655f3000000001"}) 09:11:15 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@remote}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000140)={@dev}, 0x14) syz_emit_ethernet(0x3e, &(0x7f0000001180)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b7e720", 0x8, 0x3a, 0x0, @local, @local={0xfe, 0x80, [0x3]}, {[], @icmpv6=@echo_request}}}}}, 0x0) 09:11:15 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) close(r0) [ 136.891270] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:11:15 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x88) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x0, 0x400806e, 0x0, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000000)=0xb235, 0x4) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0) 09:11:15 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000002fc0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000380)={&(0x7f0000000500), 0xc, &(0x7f0000000340)={&(0x7f0000000140)={0x60, r1, 0x209, 0x0, 0x0, {}, [{{0x8, 0x1, r2}, {0x44, 0x2, [{0x18, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}]}, 0x60}}, 0x0) [ 137.504399] netlink: 20 bytes leftover after parsing attributes in process `syz-executor3'. 09:11:16 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8dab}]}, 0x10) sendto$inet6(r1, &(0x7f0000000300), 0x0, 0x4008080, 0x0, 0x0) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x4000000000000000) 09:11:16 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") bpf$MAP_CREATE(0x0, &(0x7f0000000cc0)={0x16, 0x0, 0x2, 0x6, 0x0, 0x1, 0x0, [0x11]}, 0x2c) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0xffffffff80000001) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000140)={{0x5e, @local, 0x4e21, 0x2, 'lc\x00', 0x4, 0x14fa, 0xe77}, {@multicast1, 0x4e23, 0x2, 0x7fffffff}}, 0x44) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f0000000080)="03", 0x1) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r3 = accept(r0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffff9c, 0x0, 0x5, &(0x7f0000000340)='em1\'\x00'}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendmsg$netlink(r3, &(0x7f0000000f40)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000000c0)=ANY=[@ANYBLOB], 0x1}], 0x1}, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) 09:11:16 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x88) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x0, 0x400806e, 0x0, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000000)=0xb235, 0x4) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0) 09:11:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000002fc0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000380)={&(0x7f0000000500), 0xc, &(0x7f0000000340)={&(0x7f0000000140)={0x60, r1, 0x209, 0x0, 0x0, {}, [{{0x8, 0x1, r2}, {0x44, 0x2, [{0x18, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}]}, 0x60}}, 0x0) 09:11:16 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@remote}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000140)={@dev}, 0x14) syz_emit_ethernet(0x3e, &(0x7f0000001180)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b7e720", 0x8, 0x3a, 0x0, @local, @local={0xfe, 0x80, [0x3]}, {[], @icmpv6=@echo_request}}}}}, 0x0) 09:11:16 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e23, @rand_addr=0x6}, {0x2, 0x4e20, @empty}, 0x2, 0x0, 0x0, 0x0, 0x354, &(0x7f0000000040)='bond_slave_0\x00', 0x5, 0x6, 0x85f6}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x13f) sendto(r0, &(0x7f0000000340)="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", 0x6f4, 0x0, 0x0, 0x0) [ 137.720252] netlink: 20 bytes leftover after parsing attributes in process `syz-executor3'. [ 137.731795] IPVS: set_ctl: invalid protocol: 94 172.20.20.170:20001 [ 137.754160] kasan: CONFIG_KASAN_INLINE enabled [ 137.758902] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 137.766340] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 137.772584] CPU: 0 PID: 8409 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #345 [ 137.779858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 137.789231] RIP: 0010:inet_lhash2_lookup+0xc0/0x610 [ 137.794258] Code: f2 f2 f2 f2 c7 40 0c 00 f2 f2 f2 65 48 8b 04 25 28 00 00 00 48 89 45 d0 31 c0 e8 6b 20 dd fa 48 8d 7b 40 48 89 f8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 39 05 00 00 4c 8d a5 58 ff ff ff 48 8b 5b 40 [ 137.813161] RSP: 0018:ffff8881dae07050 EFLAGS: 00010202 [ 137.818523] RAX: 0000000000000008 RBX: 0000000000000000 RCX: 0000000000000014 [ 137.825796] RDX: 0000000000000100 RSI: ffffffff86a26425 RDI: 0000000000000040 [ 137.833098] RBP: ffff8881dae07168 R08: 00000000201414ac R09: 0000000000004aed [ 137.840395] R10: 0000000000004e20 R11: ffffffff8bc662ec R12: dffffc0000000000 [ 137.847683] R13: 0000000000004e20 R14: ffffffff8bc662c0 R15: 00000000201414ac [ 137.854986] FS: 00007f802b225700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000 [ 137.856400] kobject: 'loop5' (00000000d55495bd): kobject_uevent_env [ 137.863229] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 137.863237] CR2: 0000001b2f427000 CR3: 00000001c33be000 CR4: 00000000001406f0 [ 137.863249] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 137.863257] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 137.863261] Call Trace: [ 137.863266] [ 137.863297] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 137.863324] ? __skb_checksum+0x599/0x920 [ 137.874302] kobject: 'loop5' (00000000d55495bd): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 137.875610] ? inet_ehashfn+0x1c0/0x1c0 [ 137.875625] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 137.875639] ? __inet_lookup_established+0x466/0x660 [ 137.875656] ? skb_checksum+0xd9/0x140 [ 137.939202] __inet_lookup_listener+0x129/0x2d0 [ 137.943875] dccp_v4_rcv+0x11ad/0x1f58 [ 137.947771] ? dccp_v4_err+0x18c0/0x18c0 [ 137.951853] ? __lock_is_held+0xb5/0x140 [ 137.955917] ip_protocol_deliver_rcu+0xb5/0xa10 [ 137.960587] ? ip_call_ra_chain+0x730/0x730 [ 137.964909] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 137.970187] ? rcu_softirq_qs+0x20/0x20 [ 137.974161] ip_local_deliver_finish+0x243/0x390 [ 137.978967] ip_local_deliver+0x1e9/0x750 [ 137.983182] ? ip_local_deliver_finish+0x390/0x390 [ 137.988145] ? ip_protocol_deliver_rcu+0xa10/0xa10 [ 137.993079] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 137.998040] ? kasan_check_read+0x11/0x20 [ 138.002243] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 138.007265] ? rcu_softirq_qs+0x20/0x20 [ 138.011245] ip_rcv_finish+0x1f9/0x300 [ 138.015141] ip_rcv+0xed/0x600 [ 138.016699] kobject: 'loop4' (00000000d5d40482): kobject_uevent_env [ 138.018355] ? ip_local_deliver+0x750/0x750 [ 138.018371] ? ip_rcv_finish_core.isra.16+0x1f40/0x1f40 [ 138.018390] ? lock_acquire+0x1ed/0x520 [ 138.036301] kobject: 'loop4' (00000000d5d40482): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 138.038410] ? process_backlog+0x1dd/0x7a0 [ 138.038426] __netif_receive_skb_one_core+0x14d/0x200 [ 138.038442] ? __netif_receive_skb_core+0x37f0/0x37f0 [ 138.062466] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 138.067761] ? rcu_softirq_qs+0x20/0x20 [ 138.071741] ? trace_hardirqs_off_caller+0x310/0x310 [ 138.076847] __netif_receive_skb+0x2c/0x1e0 [ 138.081201] process_backlog+0x24e/0x7a0 [ 138.082044] kobject: 'loop3' (00000000cca022e6): kobject_uevent_env [ 138.085277] net_rx_action+0x7fa/0x19b0 [ 138.085301] ? napi_complete_done+0x7c0/0x7c0 [ 138.100158] ? migrate_swap_stop+0x8a0/0x8a0 [ 138.104568] ? lock_downgrade+0x900/0x900 [ 138.108719] ? find_held_lock+0x36/0x1c0 [ 138.112790] ? zap_class+0x640/0x640 [ 138.115931] kobject: 'loop3' (00000000cca022e6): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 138.116515] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 138.131487] ? kasan_check_read+0x11/0x20 [ 138.135633] ? do_raw_spin_lock+0x14f/0x350 [ 138.139957] ? find_held_lock+0x36/0x1c0 [ 138.144025] ? clockevents_program_event+0x158/0x370 [ 138.149165] ? lock_downgrade+0x900/0x900 [ 138.153317] ? zap_class+0x640/0x640 [ 138.157040] ? print_usage_bug+0xc0/0xc0 [ 138.161115] ? trace_hardirqs_on+0x310/0x310 [ 138.165523] ? kvm_clock_read+0x18/0x30 [ 138.169495] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 138.174515] ? ktime_get+0x2c1/0x400 [ 138.178231] ? zap_class+0x640/0x640 [ 138.181950] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 138.187492] ? check_preemption_disabled+0x48/0x280 [ 138.192519] ? __lock_is_held+0xb5/0x140 [ 138.196609] __do_softirq+0x308/0xb7e [ 138.200421] ? __irqentry_text_end+0x1f9658/0x1f9658 [ 138.205536] ? irq_exit+0xbd/0x1c0 [ 138.209100] ? smp_apic_timer_interrupt+0x1cb/0x760 [ 138.214170] ? smp_call_function_single_interrupt+0x159/0x650 [ 138.220055] ? smp_call_function_single_interrupt+0x650/0x650 [ 138.225950] ? ret_from_intr+0xb/0x1e [ 138.229760] ? trace_hardirqs_off_caller+0xbb/0x310 [ 138.234778] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 138.239620] ? trace_hardirqs_on_caller+0x310/0x310 [ 138.244634] ? task_prio+0x50/0x50 [ 138.248184] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 138.253735] ? check_preemption_disabled+0x48/0x280 [ 138.258761] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 138.263622] ? ip_finish_output2+0xa89/0x1a30 [ 138.268144] do_softirq_own_stack+0x2a/0x40 09:11:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000002fc0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000380)={&(0x7f0000000500), 0xc, &(0x7f0000000340)={&(0x7f0000000140)={0x60, r1, 0x209, 0x0, 0x0, {}, [{{0x8, 0x1, r2}, {0x44, 0x2, [{0x18, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}]}, 0x60}}, 0x0) 09:11:16 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@remote}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000140)={@dev}, 0x14) syz_emit_ethernet(0x3e, &(0x7f0000001180)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b7e720", 0x8, 0x3a, 0x0, @local, @local={0xfe, 0x80, [0x3]}, {[], @icmpv6=@echo_request}}}}}, 0x0) 09:11:16 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x88) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x0, 0x400806e, 0x0, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000000)=0xb235, 0x4) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0) 09:11:16 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e23, @rand_addr=0x6}, {0x2, 0x4e20, @empty}, 0x2, 0x0, 0x0, 0x0, 0x354, &(0x7f0000000040)='bond_slave_0\x00', 0x5, 0x6, 0x85f6}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x13f) sendto(r0, &(0x7f0000000340)="7589f0da892457ee3604b3303d1176a13baaebcab9eba210a07246127b486e98e3029104796460b1dfef95b0368b0b19c338b1306db81cea8edfc66a6212607f01496a9963ef1a83caee01bd72e85c40dd287a1055ca6b801959badb1253ae3a85a47b0ec39b760f063d4756614fc1d3e68b9f4f32be2652ce67d2e776b433331ad58b9d70c0f258e00b9d56ff7ecb14e6050c70da00c5006b8cffd8f169f2861e2df3efe13056d1babf3dde7a2a1a5cc8cb207e10f61e215d2935a43c0db2cef01e23933caac8c3ea44870dd6b4e7e87ec42d4a8cfe2940ddd6a1b68a8b114bf5fc57a24b948eed855edf063898f64a0ce82678a3be37f9d56de9535406c2810de8f314a51ae300d351825ded003652d5ab0b30f7ced329324632f710076a9f79c3221e90ec03803b6ecd5595646214e391a3cfd74ca98d098d3fac9fccd6b0905b03f3c6a50eeef0e61cd07ad75b39267a304fb12bdde7b4d06e64a42aee0504ae42f36f13d5e3002975f648e632ec25aa10429d84a078914a28c47ae0b143f43b100790646f1f7bb25191ab9d0b210e18f5610749521e385a7dc15b6b946baa49a0b35b4c56947b57279e5b5e3d04baab408442f3ba124cc70dadeb8a564eb796fb7975859f50a8a41ebc9baf1ab48855b54d47884126e66d890d714fd57c5dec487bfb5d94c839d9bbe57e70dead6a26d44af14b53a620424cb3404a7e3961c7ff568f6345f6cc3a5c49be7e76a33e652acf88b3bbbe6f83bc49621654627eedc41393250fdc3f997f6aa3f4f8ba8184c8fc5fe9bd37ca8081077b72e93af80af9bf4a47f943df12bc25ca1f25fb5bc39fbe685aed03e20269fa1ceda0d1c31754b974081a14ec6801ab751acc29aff079fcde12237555463bf13eb77e16eeb6ae8aa7fe36806826fb5e4f86fa757ba66c7dc0ac4ffdfe411db3a40b1d0d6a79b1585122cc1d0c3a18f0aab8ac72942451f67ec6cc6fed353239f10a99c2a836b90320b803c04f931e6ffdad5d3dda56e62d379cd76eb87b8c9470cee2348913f2260e3ae0213183c4898c3d64bb826a5d227cc05e005538b1ac4e70f6fdda5e16b67a471c0d655e21c7dd5aa647058146104cad84a32002de9857704c66c162f866795076a503f69192fd49ffd327ac385012bc66edb2e14f0af6b53feeb6d8271391edd74396a986baa072bdf5221e829c7d8241cfb1c866112c8ca033e34fd845d84c5bc054646057fa523f757dcf484c8747314c5a1f5f11b3e0ba45edd10e09e9e2925fe4229bd155a1cc62a8928686d6518b3f0da7d39a2b26368bd07f9a3222ce9b3fe41b12988b004543879ac863842e0a81ee7b9ebc1a98bdb020d617c00953a9cd98632b7b2024f6be6cb8795688c131950a77579850aef05278eb5e7692a6bb52200a0d37327ceff14d7f75fa6f6058197caf451ff520a80e05231db86fd254da587cd70d0b8c74b1a81be258aa355968d5730c0c5234a85dde00fabc96ecfe2d483ebe79487124d5bc77b03fefba765c138d0302e2d3c65dbf6f2833aea785a0c66ec6cd7ad463aa158a23185ee494f886e35cc7051fab1ebd22751200c3790e090d122490a330df980e1e60f9930bca4410adc36e4fb5be6241e3db72972371e6da890306ac9a3bc9b5ce6ef3a71a5ce0652a17433edbc46da151d1cecf946a52c9cd9dba5021924e6f3d038d10d27d424e152e852bd1095bdc533c6b9f43f6e9ef2714d7e6c26da09ad3f6d22dc8ff14d3546a339e3be4751b422054be4199bc05d6a71f4a236bf9e5681e23e1a4b9943ebeb1424f89596afed8c61d3c7e6554959fefd8a1923c3256199c7e3c4142108bb6c817a44e1de7621f0311adf5a9fcf3e209b9af7183b4c42d32586d5ab7a9d4d32f482aa6aee9af9ebe79d0dca8e0d716903f468f48c71c92a4f30da7dad9781a153e71d23d082b419e5f7bf1f956a7aa3a22ab66b0a00333c1c085679910e8a66994dc09f142907597b170390ec0d5a3ab0c6d22dd6a9b92f598d884d65235e47fb8459a5014f1c95f5bcaebb0066620cb890134fee3f03ecf530f9e4533b8dbfa2a5a8405e127b4164fe8d027e1a3a61081c5a04ed9a328da849deb9d154901daf4912baf3eafa3bdd8648cad22afa4aa0c0001e376fba11971e0fe4e418fa001cd56d5f3ea94178becbe2189d5a6d649b2889310f433625cf528bd6ce0f252ba879552b3134a1623ef2809d9a53b07d6ed0e62bbd660b8a7c54243ff20548c32b7a902ea6e133ac0d813c07bc2b60b05ab371bf32e5eaa0d1fd2e9595725f70bb0e855946be5d5017648e70057b08625a2b3227a59eb83ebd3b9e4c76d62b3fc6ecb0944b09abfc9adbfb2afd8ce62efdbb9b2c669f2d0645227cd4c9bc4d8857fd3cae24c92ce419c1d794b4419035f541bf0afdb37092844f0c27193622e25ea341ff22158023e93cc1da75345dd6b9d5a391d13ff88ada95ab214388f66145f37830390bc7e9a72a80fd2789e4c07868fcdf5650d1d96", 0x6f4, 0x0, 0x0, 0x0) [ 138.272456] [ 138.274694] do_softirq.part.14+0x126/0x160 [ 138.275384] kobject: 'loop2' (0000000059fc6a90): kobject_uevent_env [ 138.279018] __local_bh_enable_ip+0x21d/0x260 [ 138.279033] ip_finish_output2+0xabc/0x1a30 [ 138.279047] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 138.279064] ? ip_copy_metadata+0xdb0/0xdb0 [ 138.295856] kobject: 'loop2' (0000000059fc6a90): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 138.299571] ? zap_class+0x640/0x640 [ 138.299588] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 138.299606] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 138.328112] ? ipv4_mtu+0x39f/0x590 [ 138.331771] ? __lock_is_held+0xb5/0x140 [ 138.335846] ip_finish_output+0x7fd/0xfa0 [ 138.339990] ? ip_finish_output+0x7fd/0xfa0 [ 138.344309] ? ip_fragment.constprop.51+0x240/0x240 [ 138.349318] ? kasan_check_read+0x11/0x20 [ 138.353460] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 138.358743] ? nf_nat_ipv4_out+0x2e1/0x340 [ 138.362985] ? rcu_softirq_qs+0x20/0x20 [ 138.366962] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 138.372005] ? nf_hook_slow+0x11e/0x1c0 [ 138.375997] ip_output+0x21d/0x8d0 [ 138.379538] ? ip_mc_output+0x15b0/0x15b0 [ 138.383685] ? ip_fragment.constprop.51+0x240/0x240 [ 138.388697] ? __lock_is_held+0xb5/0x140 [ 138.392764] ip_local_out+0xc5/0x1b0 [ 138.396475] __ip_queue_xmit+0x9af/0x1f40 [ 138.400626] ? ip_build_and_send_pkt+0xc90/0xc90 [ 138.405378] ? __skb_checksum+0x920/0x920 [ 138.409518] ? skb_send_sock_locked+0x9b0/0x9b0 [ 138.414182] ? reqsk_fastopen_remove+0x660/0x660 [ 138.418934] ? dccp_insert_option_padding+0x5c/0xe0 [ 138.423953] ip_queue_xmit+0x56/0x70 [ 138.427663] dccp_transmit_skb+0x98c/0x12e0 [ 138.431987] dccp_connect+0x39a/0x6e0 [ 138.435784] ? dccp_send_ack+0x360/0x360 [ 138.439845] ? dst_release+0x5d/0xb0 [ 138.443559] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 138.449099] ? sk_setup_caps+0x209/0x690 [ 138.453166] dccp_v4_connect+0xd57/0x1540 [ 138.457318] __inet_stream_connect+0x992/0x1150 [ 138.461990] ? inet_dgram_connect+0x2e0/0x2e0 [ 138.466482] ? trace_hardirqs_on+0xbd/0x310 [ 138.470823] ? lock_release+0xa00/0xa00 [ 138.474791] ? lock_sock_nested+0xe2/0x120 [ 138.479017] ? trace_hardirqs_off_caller+0x310/0x310 [ 138.484122] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 138.489657] ? check_preemption_disabled+0x48/0x280 [ 138.494668] ? lock_sock_nested+0x9a/0x120 [ 138.498896] ? lock_sock_nested+0x9a/0x120 [ 138.503132] ? __local_bh_enable_ip+0x160/0x260 [ 138.507796] inet_stream_connect+0x58/0xa0 [ 138.512024] __sys_connect+0x37d/0x4c0 [ 138.515908] ? __ia32_sys_accept+0xb0/0xb0 [ 138.520137] ? kasan_check_read+0x11/0x20 [ 138.524279] ? _copy_to_user+0xc8/0x110 [ 138.528247] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 138.533796] ? put_timespec64+0x10f/0x1b0 [ 138.537944] ? do_syscall_64+0x9a/0x820 [ 138.541919] ? do_syscall_64+0x9a/0x820 [ 138.545888] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 138.550469] ? trace_hardirqs_on+0xbd/0x310 [ 138.554789] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 138.560325] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 138.565684] ? trace_hardirqs_off_caller+0x310/0x310 [ 138.570785] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 138.576323] __x64_sys_connect+0x73/0xb0 [ 138.580379] do_syscall_64+0x1b9/0x820 [ 138.584260] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 138.589620] ? syscall_return_slowpath+0x5e0/0x5e0 [ 138.594542] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 138.599382] ? trace_hardirqs_on_caller+0x310/0x310 [ 138.604398] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 138.609409] ? prepare_exit_to_usermode+0x291/0x3b0 [ 138.614426] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 138.619271] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 138.624453] RIP: 0033:0x457659 [ 138.627640] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 138.646533] RSP: 002b:00007f802b224c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 138.654248] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457659 [ 138.661510] RDX: 0000000000000010 RSI: 0000000020e5c000 RDI: 0000000000000005 [ 138.668790] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 138.676052] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f802b2256d4 [ 138.683323] R13: 00000000004bdc1a R14: 00000000004cd620 R15: 00000000ffffffff [ 138.690606] Modules linked in: [ 138.693925] ---[ end trace e91a2e6b9a32e9de ]--- [ 138.698721] RIP: 0010:inet_lhash2_lookup+0xc0/0x610 [ 138.703779] Code: f2 f2 f2 f2 c7 40 0c 00 f2 f2 f2 65 48 8b 04 25 28 00 00 00 48 89 45 d0 31 c0 e8 6b 20 dd fa 48 8d 7b 40 48 89 f8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 39 05 00 00 4c 8d a5 58 ff ff ff 48 8b 5b 40 [ 138.722741] RSP: 0018:ffff8881dae07050 EFLAGS: 00010202 [ 138.728119] RAX: 0000000000000008 RBX: 0000000000000000 RCX: 0000000000000014 [ 138.735431] RDX: 0000000000000100 RSI: ffffffff86a26425 RDI: 0000000000000040 [ 138.742731] RBP: ffff8881dae07168 R08: 00000000201414ac R09: 0000000000004aed [ 138.750048] R10: 0000000000004e20 R11: ffffffff8bc662ec R12: dffffc0000000000 [ 138.757352] R13: 0000000000004e20 R14: ffffffff8bc662c0 R15: 00000000201414ac [ 138.764674] FS: 00007f802b225700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000 [ 138.772924] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 138.777794] kobject: 'loop2' (0000000059fc6a90): kobject_uevent_env [ 138.778805] CR2: 0000001b2f427000 CR3: 00000001c33be000 CR4: 00000000001406f0 [ 138.778817] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 138.778840] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 138.778852] Kernel panic - not syncing: Fatal exception in interrupt [ 138.787718] kobject: 'loop2' (0000000059fc6a90): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 138.793525] Kernel Offset: disabled [ 138.827550] Rebooting in 86400 seconds..