[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 70.898788][ T26] audit: type=1800 audit(1558952360.858:25): pid=8696 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 70.956083][ T26] audit: type=1800 audit(1558952360.858:26): pid=8696 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 70.992815][ T26] audit: type=1800 audit(1558952360.858:27): pid=8696 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.47' (ECDSA) to the list of known hosts. 2019/05/27 10:19:31 fuzzer started 2019/05/27 10:19:34 dialing manager at 10.128.0.26:46655 2019/05/27 10:19:34 syscalls: 1006 2019/05/27 10:19:34 code coverage: enabled 2019/05/27 10:19:34 comparison tracing: enabled 2019/05/27 10:19:34 extra coverage: extra coverage is not supported by the kernel 2019/05/27 10:19:34 setuid sandbox: enabled 2019/05/27 10:19:34 namespace sandbox: enabled 2019/05/27 10:19:34 Android sandbox: /sys/fs/selinux/policy does not exist 2019/05/27 10:19:34 fault injection: enabled 2019/05/27 10:19:34 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/05/27 10:19:34 net packet injection: enabled 2019/05/27 10:19:34 net device setup: enabled 10:21:01 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000100)=[{0x4000000094, 0x0, 0x0, 0xfffff000}, {0x80000006}]}, 0x10) syzkaller login: [ 171.285299][ T8864] IPVS: ftp: loaded support on port[0] = 21 10:21:01 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000340)={0x20}) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x10076) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x2880008, r0, 0x6, 0x8, 0xe0ffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 171.416789][ T8864] chnl_net:caif_netlink_parms(): no params data found [ 171.523563][ T8864] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.540719][ T8864] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.561136][ T8864] device bridge_slave_0 entered promiscuous mode [ 171.581739][ T8864] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.589078][ T8864] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.607699][ T8864] device bridge_slave_1 entered promiscuous mode 10:21:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6_sctp(0xa, 0x8000000000001, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x76, &(0x7f0000ad2000), &(0x7f0000000080)=0xfdd2) [ 171.635378][ T8864] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 171.652239][ T8867] IPVS: ftp: loaded support on port[0] = 21 [ 171.661701][ T8864] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 171.723881][ T8864] team0: Port device team_slave_0 added [ 171.744914][ T8864] team0: Port device team_slave_1 added 10:21:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130009006900000000000000ab00804803000000460001070000001419000a0000000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) [ 171.863125][ T8864] device hsr_slave_0 entered promiscuous mode [ 171.890129][ T8864] device hsr_slave_1 entered promiscuous mode [ 171.944004][ T8869] IPVS: ftp: loaded support on port[0] = 21 [ 171.979485][ T8864] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.987009][ T8864] bridge0: port 2(bridge_slave_1) entered forwarding state [ 171.994846][ T8864] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.002019][ T8864] bridge0: port 1(bridge_slave_0) entered forwarding state [ 172.136240][ T8872] IPVS: ftp: loaded support on port[0] = 21 [ 172.207172][ T8867] chnl_net:caif_netlink_parms(): no params data found 10:21:02 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) close(r1) close(r0) pipe(&(0x7f0000000140)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) vmsplice(r1, &(0x7f0000001500)=[{&(0x7f00000011c0)='3', 0x1}], 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) splice(r0, 0x0, r2, 0x0, 0xc0, 0x0) [ 172.358872][ T8864] 8021q: adding VLAN 0 to HW filter on device bond0 [ 172.399041][ T8867] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.412724][ T8867] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.430757][ T8867] device bridge_slave_0 entered promiscuous mode [ 172.438537][ T8869] chnl_net:caif_netlink_parms(): no params data found [ 172.465757][ T8867] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.474998][ T8867] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.484476][ T8867] device bridge_slave_1 entered promiscuous mode [ 172.492193][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 172.513253][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.522510][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.531861][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 172.577233][ T8864] 8021q: adding VLAN 0 to HW filter on device team0 [ 172.624676][ T8877] IPVS: ftp: loaded support on port[0] = 21 10:21:02 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 172.693763][ T8867] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 172.702876][ T8869] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.710877][ T8869] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.721571][ T8869] device bridge_slave_0 entered promiscuous mode [ 172.733043][ T8869] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.740620][ T8869] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.748727][ T8869] device bridge_slave_1 entered promiscuous mode [ 172.759406][ T2900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 172.769010][ T2900] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 172.778550][ T2900] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.785705][ T2900] bridge0: port 1(bridge_slave_0) entered forwarding state [ 172.801232][ T8872] chnl_net:caif_netlink_parms(): no params data found [ 172.823041][ T8867] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 172.888827][ T8867] team0: Port device team_slave_0 added [ 172.899926][ T8867] team0: Port device team_slave_1 added [ 172.908242][ T8869] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 172.918883][ T8869] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 172.932635][ T3064] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 172.941745][ T3064] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 172.951103][ T3064] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.958483][ T3064] bridge0: port 2(bridge_slave_1) entered forwarding state [ 173.016606][ T8881] IPVS: ftp: loaded support on port[0] = 21 [ 173.019650][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 173.032421][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 173.041352][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 173.050628][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 173.065896][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 173.132087][ T8867] device hsr_slave_0 entered promiscuous mode [ 173.170041][ T8867] device hsr_slave_1 entered promiscuous mode [ 173.222205][ T8869] team0: Port device team_slave_0 added [ 173.230480][ T8869] team0: Port device team_slave_1 added [ 173.267794][ T8872] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.275045][ T8872] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.283325][ T8872] device bridge_slave_0 entered promiscuous mode [ 173.291547][ T8872] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.298622][ T8872] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.306792][ T8872] device bridge_slave_1 entered promiscuous mode [ 173.315661][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 173.324750][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 173.377704][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 173.387816][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 173.452925][ T8869] device hsr_slave_0 entered promiscuous mode [ 173.500156][ T8869] device hsr_slave_1 entered promiscuous mode [ 173.549270][ T8872] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 173.591433][ T8872] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 173.639009][ T8871] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 173.647771][ T8871] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 173.658304][ T8872] team0: Port device team_slave_0 added [ 173.673066][ T8872] team0: Port device team_slave_1 added [ 173.682515][ T8877] chnl_net:caif_netlink_parms(): no params data found [ 173.704660][ T8864] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 173.772807][ T8872] device hsr_slave_0 entered promiscuous mode [ 173.810067][ T8872] device hsr_slave_1 entered promiscuous mode [ 173.897234][ T8864] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 173.912134][ T8877] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.919225][ T8877] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.927588][ T8877] device bridge_slave_0 entered promiscuous mode [ 173.942607][ T8877] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.949973][ T8877] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.958020][ T8877] device bridge_slave_1 entered promiscuous mode [ 173.997996][ T8877] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 174.008732][ T8877] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 174.083600][ T8881] chnl_net:caif_netlink_parms(): no params data found [ 174.106506][ T8877] team0: Port device team_slave_0 added [ 174.114592][ T8877] team0: Port device team_slave_1 added [ 174.174702][ T8869] 8021q: adding VLAN 0 to HW filter on device bond0 10:21:04 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000004, 0x0, 0xf, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x70}}, 0x0) [ 174.253021][ T8877] device hsr_slave_0 entered promiscuous mode [ 174.270695][ T8877] device hsr_slave_1 entered promiscuous mode [ 174.332333][ T8881] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.340848][ T8881] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.348594][ T8881] device bridge_slave_0 entered promiscuous mode [ 174.357439][ T8881] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.364788][ T8881] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.373589][ T8881] device bridge_slave_1 entered promiscuous mode [ 174.392779][ T8872] 8021q: adding VLAN 0 to HW filter on device bond0 [ 174.417358][ T8877] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.424554][ T8877] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.431965][ T8877] bridge0: port 1(bridge_slave_0) entered blocking state 10:21:04 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0xc5) sendfile(r0, r0, &(0x7f00000000c0), 0xfdef) sendfile(r0, r0, 0x0, 0xe08c) socket$inet(0x10, 0x3, 0x0) [ 174.439036][ T8877] bridge0: port 1(bridge_slave_0) entered forwarding state [ 174.487302][ T8880] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.505384][ T8880] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.516184][ T8880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 174.524289][ T8880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 174.532820][ T8880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 174.540820][ T8880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 174.553101][ T8867] 8021q: adding VLAN 0 to HW filter on device bond0 [ 174.562552][ T8881] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 174.578938][ T8869] 8021q: adding VLAN 0 to HW filter on device team0 10:21:04 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0xc5) sendfile(r0, r0, &(0x7f00000000c0), 0xfdef) sendfile(r0, r0, 0x0, 0xe08c) socket$inet(0x10, 0x3, 0x0) [ 174.591142][ T8872] 8021q: adding VLAN 0 to HW filter on device team0 [ 174.611284][ T8880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 174.623447][ T8880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 174.633980][ T8881] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 174.664813][ T8867] 8021q: adding VLAN 0 to HW filter on device team0 [ 174.688274][ T8880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 174.698498][ T8880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 174.707357][ T8880] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.714497][ T8880] bridge0: port 1(bridge_slave_0) entered forwarding state [ 174.724087][ T8880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 174.732878][ T8880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 174.741799][ T8880] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.748871][ T8880] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.757171][ T8880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 10:21:04 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0xc5) sendfile(r0, r0, &(0x7f00000000c0), 0xfdef) sendfile(r0, r0, 0x0, 0xe08c) socket$inet(0x10, 0x3, 0x0) [ 174.766631][ T8880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 174.775931][ T8880] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.783057][ T8880] bridge0: port 1(bridge_slave_0) entered forwarding state [ 174.793031][ T8880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 174.802877][ T8880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 174.811691][ T8880] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.818764][ T8880] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.828267][ T8880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 174.873384][ T8881] team0: Port device team_slave_0 added 10:21:04 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0xc5) sendfile(r0, r0, &(0x7f00000000c0), 0xfdef) sendfile(r0, r0, 0x0, 0xe08c) socket$inet(0x10, 0x3, 0x0) [ 174.919791][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 174.927796][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 174.936555][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 174.945735][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 174.958412][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 174.980595][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 174.989403][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 175.021575][ T8881] team0: Port device team_slave_1 added [ 175.041266][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 175.049325][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 175.059462][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 10:21:05 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0xc5) sendfile(r0, r0, &(0x7f00000000c0), 0xfdef) sendfile(r0, r0, 0x0, 0xe08c) socket$inet(0x10, 0x3, 0x0) [ 175.068821][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 175.078445][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 175.088315][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 175.098391][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 175.108793][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 175.118054][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 175.126641][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.133780][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.145569][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 175.155283][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 175.164994][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.172126][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 175.180057][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 175.188907][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 175.197785][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 175.206419][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 175.214925][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 10:21:05 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0xc5) sendfile(r0, r0, &(0x7f00000000c0), 0xfdef) sendfile(r0, r0, 0x0, 0xe08c) socket$inet(0x10, 0x3, 0x0) [ 175.227631][ T8869] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 175.244239][ T8869] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 175.266757][ T8872] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 175.292576][ T8872] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 175.315318][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 175.325143][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 175.341423][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 175.356043][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 175.364657][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 175.379485][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 175.394404][ T8877] 8021q: adding VLAN 0 to HW filter on device bond0 [ 175.441188][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 175.450277][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 175.459095][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 175.478624][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 175.498829][ T8877] 8021q: adding VLAN 0 to HW filter on device team0 [ 175.513800][ T8872] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 175.572965][ T8881] device hsr_slave_0 entered promiscuous mode [ 175.620056][ T8881] device hsr_slave_1 entered promiscuous mode [ 175.663895][ T2900] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 175.672081][ T2900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 175.679944][ T2900] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 175.688581][ T2900] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 175.697458][ T2900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 175.705949][ T2900] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 175.723257][ T8867] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 175.736390][ T8867] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 175.752176][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 175.762025][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 175.770988][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.778055][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.788106][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 175.796902][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 175.805221][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 175.814013][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 175.822941][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.830063][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 175.837607][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 175.863283][ T2900] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 175.884241][ T8869] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 175.903122][ T2900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 175.920652][ T2900] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 175.937915][ T8867] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 175.972009][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 175.981872][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 176.001179][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 176.037245][ T8926] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 176.051656][ T2900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 176.079059][ T2900] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 176.088897][ T2900] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 176.101944][ T2900] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 176.121077][ T8877] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 176.218021][ T8877] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 176.243294][ T8881] 8021q: adding VLAN 0 to HW filter on device bond0 [ 176.293603][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 176.303929][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 176.339488][ T8881] 8021q: adding VLAN 0 to HW filter on device team0 [ 176.379278][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 176.400630][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 176.410742][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.417897][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 176.436701][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 176.446521][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 176.456588][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 176.465810][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.472962][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 176.481433][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 176.500275][ T2900] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 176.509068][ T2900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 176.542750][ T2900] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 176.561288][ T2900] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 176.582787][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 10:21:06 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x3c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 10:21:06 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0xc5) sendfile(r0, r0, &(0x7f00000000c0), 0xfdef) sendfile(r0, r0, 0x0, 0xe08c) socket$inet(0x10, 0x3, 0x0) 10:21:06 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) [ 176.603832][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 176.616988][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 176.628612][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 176.642634][ T8881] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 176.666557][ T8881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 176.718718][ T8880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 176.743299][ T8880] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 176.811325][ T8881] 8021q: adding VLAN 0 to HW filter on device batadv0 10:21:06 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) close(r1) close(r0) pipe(&(0x7f0000000140)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) vmsplice(r1, &(0x7f0000001500)=[{&(0x7f00000011c0)='3', 0x1}], 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) splice(r0, 0x0, r2, 0x0, 0xc0, 0x0) 10:21:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0x1000}], 0x1}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000380)) close(r2) r3 = socket(0x800000000000011, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r3, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="000026bd7000fddbdf2503000000480003001400060035bff4c3af1c2a4a5e8036e1a38f7f1c14000600ff010000000000000000000000000001140002006e72300000000000000000000000000008000400ff0000003c000100080004004e240000080004004e210000080002003a0000000800060064680000080001000a0000000800090073000000080001000a00000008000400270400000c000100080009005b0000001c00020008000700090000000800050000000000080002004e220000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x50) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000180), &(0x7f0000000340)=0x4) getpeername$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000440)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000000c0), 0x4557434d) sendfile(r2, r4, 0x0, 0x20000000006) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, 0x0, &(0x7f0000000580)="3ffdea3dde9974f67f46f98a49a3fd68451f11a1f6703759764bf26a978a572ecb4261c6e0e8ed4982723bc4bd556b238c4b50ba714a4de15c4b3c604cab9007e2d0f94b67cf8129461d9b42384127fcf8fc09ba"}, 0x20) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0xffffffffffffffb9, r5, 0x20, 0x40}, 0x1c}, 0x1, 0x0, 0x0, 0x8000000000}, 0x0) 10:21:07 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) bind$ax25(r0, &(0x7f0000000000)={{0x3, @default}, [@netrom, @rose, @rose, @rose, @rose, @bcast, @bcast]}, 0x10) getsockname$ax25(r0, 0x0, &(0x7f0000000100)) 10:21:07 executing program 0: syz_genetlink_get_family_id$ipvs(&(0x7f0000006c00)='IPVS\x00') mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7}}], 0x48}, 0x0) 10:21:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x59, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x2ff}, 0x48) 10:21:07 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) 10:21:07 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) close(r1) close(r0) pipe(&(0x7f0000000140)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) vmsplice(r1, &(0x7f0000001500)=[{&(0x7f00000011c0)='3', 0x1}], 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) splice(r0, 0x0, r2, 0x0, 0xc0, 0x0) 10:21:07 executing program 1: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000100)={0x41, 0x0, 0x4}, 0x10) 10:21:07 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) close(r1) close(r0) pipe(&(0x7f0000000140)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) vmsplice(r1, &(0x7f0000001500)=[{&(0x7f00000011c0)='3', 0x1}], 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) splice(r0, 0x0, r2, 0x0, 0xc0, 0x0) 10:21:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000001880)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 10:21:07 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) bind$ax25(r0, &(0x7f0000000000)={{0x3, @default}, [@netrom, @rose, @rose, @rose, @rose, @bcast, @bcast]}, 0x10) getsockname$ax25(r0, 0x0, &(0x7f0000000100)) 10:21:07 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) 10:21:07 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) bind$ax25(r0, &(0x7f0000000000)={{0x3, @default}, [@netrom, @rose, @rose, @rose, @rose, @bcast, @bcast]}, 0x10) getsockname$ax25(r0, 0x0, &(0x7f0000000100)) 10:21:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0x1000}], 0x1}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000380)) close(r2) r3 = socket(0x800000000000011, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r3, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="000026bd7000fddbdf2503000000480003001400060035bff4c3af1c2a4a5e8036e1a38f7f1c14000600ff010000000000000000000000000001140002006e72300000000000000000000000000008000400ff0000003c000100080004004e240000080004004e210000080002003a0000000800060064680000080001000a0000000800090073000000080001000a00000008000400270400000c000100080009005b0000001c00020008000700090000000800050000000000080002004e220000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x50) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000180), &(0x7f0000000340)=0x4) getpeername$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000440)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000000c0), 0x4557434d) sendfile(r2, r4, 0x0, 0x20000000006) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, 0x0, &(0x7f0000000580)="3ffdea3dde9974f67f46f98a49a3fd68451f11a1f6703759764bf26a978a572ecb4261c6e0e8ed4982723bc4bd556b238c4b50ba714a4de15c4b3c604cab9007e2d0f94b67cf8129461d9b42384127fcf8fc09ba"}, 0x20) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0xffffffffffffffb9, r5, 0x20, 0x40}, 0x1c}, 0x1, 0x0, 0x0, 0x8000000000}, 0x0) 10:21:08 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) bind$ax25(r0, &(0x7f0000000000)={{0x3, @default}, [@netrom, @rose, @rose, @rose, @rose, @bcast, @bcast]}, 0x10) getsockname$ax25(r0, 0x0, &(0x7f0000000100)) 10:21:08 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @initdev, 0x8}], 0x1c) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x14, &(0x7f0000001240)={0x2}, 0x8) 10:21:08 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0xa, 0x0, &(0x7f0000000040)) 10:21:08 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) 10:21:08 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) bind$ax25(r0, &(0x7f0000000000)={{0x3, @default}, [@netrom, @rose, @rose, @rose, @rose, @bcast, @bcast]}, 0x10) getsockname$ax25(r0, 0x0, &(0x7f0000000100)) 10:21:08 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) bind$ax25(r0, &(0x7f0000000000)={{0x3, @default}, [@netrom, @rose, @rose, @rose, @rose, @bcast, @bcast]}, 0x10) getsockname$ax25(r0, 0x0, &(0x7f0000000100)) 10:21:08 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) bind$ax25(r0, &(0x7f0000000000)={{0x3, @default}, [@netrom, @rose, @rose, @rose, @rose, @bcast, @bcast]}, 0x10) getsockname$ax25(r0, 0x0, &(0x7f0000000100)) 10:21:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0x1000}], 0x1}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000380)) close(r2) r3 = socket(0x800000000000011, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r3, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="000026bd7000fddbdf2503000000480003001400060035bff4c3af1c2a4a5e8036e1a38f7f1c14000600ff010000000000000000000000000001140002006e72300000000000000000000000000008000400ff0000003c000100080004004e240000080004004e210000080002003a0000000800060064680000080001000a0000000800090073000000080001000a00000008000400270400000c000100080009005b0000001c00020008000700090000000800050000000000080002004e220000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x50) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000180), &(0x7f0000000340)=0x4) getpeername$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000440)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000000c0), 0x4557434d) sendfile(r2, r4, 0x0, 0x20000000006) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, 0x0, &(0x7f0000000580)="3ffdea3dde9974f67f46f98a49a3fd68451f11a1f6703759764bf26a978a572ecb4261c6e0e8ed4982723bc4bd556b238c4b50ba714a4de15c4b3c604cab9007e2d0f94b67cf8129461d9b42384127fcf8fc09ba"}, 0x20) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0xffffffffffffffb9, r5, 0x20, 0x40}, 0x1c}, 0x1, 0x0, 0x0, 0x8000000000}, 0x0) 10:21:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ofb(arc4)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="12", 0x1) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000003780)=[{0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f0000001a00)="60ff", 0x2}], 0x1}], 0x1, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x20030000) 10:21:08 executing program 2: r0 = socket(0x400020000000010, 0x2, 0x0) write(r0, &(0x7f0000000000)="1f00000054000d0000000000fc07ff1b070404000d00000027030100010039", 0x1f) 10:21:08 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x57}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x28) [ 178.737168][ T9071] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.2'. [ 178.759878][ T9071] PF_BRIDGE: br_mdb_parse() with invalid attr 10:21:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0x1000}], 0x1}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000380)) close(r2) r3 = socket(0x800000000000011, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r3, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="000026bd7000fddbdf2503000000480003001400060035bff4c3af1c2a4a5e8036e1a38f7f1c14000600ff010000000000000000000000000001140002006e72300000000000000000000000000008000400ff0000003c000100080004004e240000080004004e210000080002003a0000000800060064680000080001000a0000000800090073000000080001000a00000008000400270400000c000100080009005b0000001c00020008000700090000000800050000000000080002004e220000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x50) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000180), &(0x7f0000000340)=0x4) getpeername$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000440)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000000c0), 0x4557434d) sendfile(r2, r4, 0x0, 0x20000000006) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, 0x0, &(0x7f0000000580)="3ffdea3dde9974f67f46f98a49a3fd68451f11a1f6703759764bf26a978a572ecb4261c6e0e8ed4982723bc4bd556b238c4b50ba714a4de15c4b3c604cab9007e2d0f94b67cf8129461d9b42384127fcf8fc09ba"}, 0x20) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0xffffffffffffffb9, r5, 0x20, 0x40}, 0x1c}, 0x1, 0x0, 0x0, 0x8000000000}, 0x0) 10:21:09 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0xa4ffffff, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) 10:21:09 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") connect$rose(r0, &(0x7f00000000c0)=@short={0xb, @dev, @remote, 0x1, @netrom}, 0x1c) 10:21:09 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x57}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x28) 10:21:09 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @initdev, 0x8}], 0x1c) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x14, &(0x7f0000001240)={0x2}, 0x8) 10:21:09 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0xcf, 0x0, &(0x7f00000003c0)) 10:21:09 executing program 2: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x17f) write(r0, &(0x7f0000000000)="1c0000004a009b8814e5f407000904000a00"/28, 0x1c) 10:21:09 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x57}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x28) 10:21:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0x1000}], 0x1}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000380)) close(r2) r3 = socket(0x800000000000011, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r3, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="000026bd7000fddbdf2503000000480003001400060035bff4c3af1c2a4a5e8036e1a38f7f1c14000600ff010000000000000000000000000001140002006e72300000000000000000000000000008000400ff0000003c000100080004004e240000080004004e210000080002003a0000000800060064680000080001000a0000000800090073000000080001000a00000008000400270400000c000100080009005b0000001c00020008000700090000000800050000000000080002004e220000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x50) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000180), &(0x7f0000000340)=0x4) getpeername$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000440)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000000c0), 0x4557434d) sendfile(r2, r4, 0x0, 0x20000000006) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, 0x0, &(0x7f0000000580)="3ffdea3dde9974f67f46f98a49a3fd68451f11a1f6703759764bf26a978a572ecb4261c6e0e8ed4982723bc4bd556b238c4b50ba714a4de15c4b3c604cab9007e2d0f94b67cf8129461d9b42384127fcf8fc09ba"}, 0x20) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0xffffffffffffffb9, r5, 0x20, 0x40}, 0x1c}, 0x1, 0x0, 0x0, 0x8000000000}, 0x0) 10:21:09 executing program 1: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x1) 10:21:09 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, {}, 0x3f, 0x2}, 0xe) 10:21:09 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x57}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x28) 10:21:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0x1000}], 0x1}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000380)) close(r2) r3 = socket(0x800000000000011, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r3, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="000026bd7000fddbdf2503000000480003001400060035bff4c3af1c2a4a5e8036e1a38f7f1c14000600ff010000000000000000000000000001140002006e72300000000000000000000000000008000400ff0000003c000100080004004e240000080004004e210000080002003a0000000800060064680000080001000a0000000800090073000000080001000a00000008000400270400000c000100080009005b0000001c00020008000700090000000800050000000000080002004e220000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x50) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000180), &(0x7f0000000340)=0x4) getpeername$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000440)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000000c0), 0x4557434d) sendfile(r2, r4, 0x0, 0x20000000006) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, 0x0, &(0x7f0000000580)="3ffdea3dde9974f67f46f98a49a3fd68451f11a1f6703759764bf26a978a572ecb4261c6e0e8ed4982723bc4bd556b238c4b50ba714a4de15c4b3c604cab9007e2d0f94b67cf8129461d9b42384127fcf8fc09ba"}, 0x20) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0xffffffffffffffb9, r5, 0x20, 0x40}, 0x1c}, 0x1, 0x0, 0x0, 0x8000000000}, 0x0) 10:21:09 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x6, 0xf087}, 0x14) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x4) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000140), 0x4) close(r0) 10:21:09 executing program 1: mmap(&(0x7f0000000000/0xdbb000)=nil, 0xdbb000, 0x4, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xd15000)=nil, 0xd15000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setsockopt(r0, 0x800000010d, 0x2, &(0x7f0000d14ffc)="02f9ffffff", 0x5) 10:21:09 executing program 3: r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @dev}, &(0x7f0000000080)=0x10, 0x80800) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f00000000c0)=0x4, 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x80108906, 0x0) pipe(&(0x7f0000009780)={0xffffffffffffffff}) getsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000097c0)=0x7f, &(0x7f0000009800)=0x4) 10:21:10 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @initdev, 0x8}], 0x1c) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x14, &(0x7f0000001240)={0x2}, 0x8) 10:21:10 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r0, 0x65, 0x10000000005, &(0x7f0000000000)="c8d63f23", 0x4) 10:21:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)={0x24, r1, 0x801, 0x0, 0x0, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e20}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}]}, 0x24}}, 0x0) 10:21:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x200000000000000, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x1000000000000000, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0xffff0020, 0x0, @in={0x2, 0x0, @multicast1=0xe0000008}}]}, 0x80}}, 0x0) [ 180.355229][ T9148] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 180.400045][ T9155] netlink: 'syz-executor.2': attribute type 10 has an invalid length. 10:21:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0x1000}], 0x1}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000380)) close(r2) r3 = socket(0x800000000000011, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r3, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="000026bd7000fddbdf2503000000480003001400060035bff4c3af1c2a4a5e8036e1a38f7f1c14000600ff010000000000000000000000000001140002006e72300000000000000000000000000008000400ff0000003c000100080004004e240000080004004e210000080002003a0000000800060064680000080001000a0000000800090073000000080001000a00000008000400270400000c000100080009005b0000001c00020008000700090000000800050000000000080002004e220000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x50) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000180), &(0x7f0000000340)=0x4) getpeername$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000440)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000000c0), 0x4557434d) sendfile(r2, r4, 0x0, 0x20000000006) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, 0x0, &(0x7f0000000580)="3ffdea3dde9974f67f46f98a49a3fd68451f11a1f6703759764bf26a978a572ecb4261c6e0e8ed4982723bc4bd556b238c4b50ba714a4de15c4b3c604cab9007e2d0f94b67cf8129461d9b42384127fcf8fc09ba"}, 0x20) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0xffffffffffffffb9, r5, 0x20, 0x40}, 0x1c}, 0x1, 0x0, 0x0, 0x8000000000}, 0x0) 10:21:10 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r0, 0x65, 0x10000000005, &(0x7f0000000000)="c8d63f23", 0x4) 10:21:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)={0x24, r1, 0x801, 0x0, 0x0, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e20}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}]}, 0x24}}, 0x0) 10:21:10 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000040)=[{r0, 0x2, 0x3000300}], 0x1, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {0xffffffffffffffff, 0x800000000000000}], 0x2, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140)={0x8}, 0x8) accept4(r0, &(0x7f0000000380)=@ethernet={0x0, @local}, &(0x7f0000000400)=0x80, 0x0) socket$netlink(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000580)={'dummy0\x00'}) getuid() sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000ab80)={0x0, 0x0, 0x0}, 0x0) ioctl$SIOCAX25CTLCON(0xffffffffffffffff, 0x89e8, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000300), 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) r1 = accept4(r0, &(0x7f0000000180)=@isdn, &(0x7f0000000280)=0x80, 0x800) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000440)={&(0x7f0000000200), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, 0x0, 0x82) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, 0x0, 0x0) 10:21:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") getsockopt$netlink(r0, 0x10e, 0x800000000a, &(0x7f00007e0000)=""/4, &(0x7f0000000040)=0x4) 10:21:10 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r2, 0x501, 0x0, 0x0, {{}, 0x0, 0x400b, 0x0, {0x8}}}, 0x24}}, 0x0) 10:21:10 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r0, 0x65, 0x10000000005, &(0x7f0000000000)="c8d63f23", 0x4) [ 180.939167][ T9169] netlink: 'syz-executor.2': attribute type 10 has an invalid length. 10:21:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)={0x24, r1, 0x801, 0x0, 0x0, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e20}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}]}, 0x24}}, 0x0) [ 181.189237][ T9189] netlink: 'syz-executor.2': attribute type 10 has an invalid length. 10:21:11 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @initdev, 0x8}], 0x1c) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x14, &(0x7f0000001240)={0x2}, 0x8) 10:21:11 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000007000)={0x0, 0x0, &(0x7f0000007ff0)={&(0x7f0000009000)=@newsa={0x138, 0x10, 0x301, 0x0, 0x0, {{@in=@broadcast}, {@in6=@loopback, 0x0, 0x32}, @in6, {}, {}, {}, 0x0, 0x0, 0x2, 0x1}, [@algo_auth={0x48, 0x1, {{'sha256\x00'}}}]}, 0x138}}, 0x0) 10:21:11 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r0, 0x65, 0x10000000005, &(0x7f0000000000)="c8d63f23", 0x4) 10:21:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)={0x24, r1, 0x801, 0x0, 0x0, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e20}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}]}, 0x24}}, 0x0) [ 181.440978][ T9201] netlink: 'syz-executor.2': attribute type 10 has an invalid length. 10:21:11 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) r1 = socket$inet6(0xa, 0x0, 0xb8c) ioctl(r1, 0x8912, &(0x7f0000000200)='\x00\x00\x00\x00\x00') unshare(0x40000000) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000280)={'ip6tnl0\x00', {0x2, 0x0, @remote}}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r3 = socket$inet(0x2, 0x6, 0x0) r4 = accept(r3, &(0x7f0000002840)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000028c0)=0x80) shutdown(r4, 0x1) getsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, &(0x7f0000002900), &(0x7f0000002940)=0x4) setsockopt$sock_int(r4, 0x1, 0x21, &(0x7f0000000380)=0x1, 0x4) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, 0x0) sendto$llc(r4, &(0x7f0000000100)="f970073b521a3a2059fcfb4e8ff5daaa892b23d0d93e42e29fd18b0a0ba812eee04266ea1e381a4bb2e397868f69542dd70dd9c732d82d1fb2fc114f477c5628dfd9882cb1704a9f32aac44aae8374041822b9186cf14d60459bd23b2cdfa2331560f6603715660f40eb2abb6eb4ac55a1b1b79c6b0cf8b2b9318c3851c8c082044b202dfddf065073e5b86df813839f8469d5e3897560064588b8857deb8aa08bb97eab5a3c887c75722b8f29c0676355437301c7bab02cae987fb632bc787275cc10ffa7d27aec6dde9675ce109785c50042c06113", 0xd6, 0x800, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, &(0x7f0000000740)) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={'lo\x00', {0x2, 0x0, @dev}}) r5 = openat$cgroup(r2, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r5, 0x6, 0x1, 0x0, 0x0}, 0x20) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x80001) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f00000005c0)=ANY=[]) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) 10:21:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x78, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 10:21:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x23, 0x829, 0x0, 0x0, {0x6}}, 0x14}, 0x1, 0x6087ffffffff}, 0x0) [ 181.816097][ T9215] IPVS: ftp: loaded support on port[0] = 21 10:21:11 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000040)=[{r0, 0x2, 0x3000300}], 0x1, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {0xffffffffffffffff, 0x800000000000000}], 0x2, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140)={0x8}, 0x8) accept4(r0, &(0x7f0000000380)=@ethernet={0x0, @local}, &(0x7f0000000400)=0x80, 0x0) socket$netlink(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000580)={'dummy0\x00'}) getuid() sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000ab80)={0x0, 0x0, 0x0}, 0x0) ioctl$SIOCAX25CTLCON(0xffffffffffffffff, 0x89e8, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000300), 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) r1 = accept4(r0, &(0x7f0000000180)=@isdn, &(0x7f0000000280)=0x80, 0x800) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000440)={&(0x7f0000000200), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, 0x0, 0x82) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, 0x0, 0x0) 10:21:11 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, &(0x7f00000001c0)) 10:21:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket(0x1f, 0x3, 0xfff) setsockopt$inet_msfilter(r1, 0x0, 0x29, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x2, 0x3000300}], 0x1, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x2) accept(r0, 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {0xffffffffffffffff, 0x2000000000000000, 0x300000000000000}], 0x2, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140), 0x8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000ab80)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r2, 0x111, 0x4, 0x0, 0x4) 10:21:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0xdb}, 0x2c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r2, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 10:21:11 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, &(0x7f00000001c0)) 10:21:12 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x4) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000000)={'bridge0\x00', &(0x7f0000000100)=@ethtool_ringparam={0xd, 0x0, 0x70c000, 0x0, 0x2}}) 10:21:12 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, &(0x7f00000001c0)) 10:21:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_SOCK_GET(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x2c, r2, 0x15, 0x0, 0x0, {0xa}, [@TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x2c}}, 0x0) 10:21:12 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, &(0x7f00000001c0)) [ 182.571420][ T9215] IPVS: ftp: loaded support on port[0] = 21 10:21:12 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) r1 = socket$inet6(0xa, 0x0, 0xb8c) ioctl(r1, 0x8912, &(0x7f0000000200)='\x00\x00\x00\x00\x00') unshare(0x40000000) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000280)={'ip6tnl0\x00', {0x2, 0x0, @remote}}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r3 = socket$inet(0x2, 0x6, 0x0) r4 = accept(r3, &(0x7f0000002840)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000028c0)=0x80) shutdown(r4, 0x1) getsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, &(0x7f0000002900), &(0x7f0000002940)=0x4) setsockopt$sock_int(r4, 0x1, 0x21, &(0x7f0000000380)=0x1, 0x4) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, 0x0) sendto$llc(r4, &(0x7f0000000100)="f970073b521a3a2059fcfb4e8ff5daaa892b23d0d93e42e29fd18b0a0ba812eee04266ea1e381a4bb2e397868f69542dd70dd9c732d82d1fb2fc114f477c5628dfd9882cb1704a9f32aac44aae8374041822b9186cf14d60459bd23b2cdfa2331560f6603715660f40eb2abb6eb4ac55a1b1b79c6b0cf8b2b9318c3851c8c082044b202dfddf065073e5b86df813839f8469d5e3897560064588b8857deb8aa08bb97eab5a3c887c75722b8f29c0676355437301c7bab02cae987fb632bc787275cc10ffa7d27aec6dde9675ce109785c50042c06113", 0xd6, 0x800, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, &(0x7f0000000740)) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={'lo\x00', {0x2, 0x0, @dev}}) r5 = openat$cgroup(r2, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r5, 0x6, 0x1, 0x0, 0x0}, 0x20) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x80001) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f00000005c0)=ANY=[]) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) 10:21:12 executing program 5: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x801}, 0x5b) write(r0, &(0x7f0000000000)="2400000012005f0214f9f40700090400070000000100"/36, 0x24) 10:21:12 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8924, &(0x7f0000000040)={'bpq0\x00@\x00\x00\b\x00\f\x00\x00\x00\x02\x00', 0x3}) [ 182.779938][ T9271] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:21:12 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000040)=[{r0, 0x2, 0x3000300}], 0x1, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {0xffffffffffffffff, 0x800000000000000}], 0x2, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140)={0x8}, 0x8) accept4(r0, &(0x7f0000000380)=@ethernet={0x0, @local}, &(0x7f0000000400)=0x80, 0x0) socket$netlink(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000580)={'dummy0\x00'}) getuid() sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000ab80)={0x0, 0x0, 0x0}, 0x0) ioctl$SIOCAX25CTLCON(0xffffffffffffffff, 0x89e8, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000300), 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) r1 = accept4(r0, &(0x7f0000000180)=@isdn, &(0x7f0000000280)=0x80, 0x800) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000440)={&(0x7f0000000200), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, 0x0, 0x82) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, 0x0, 0x0) 10:21:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000000180)={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1e}, [@nested={0x8, 0x3, [@typed={0x4, 0x0, @binary}]}]}, 0x1c}}, 0x0) [ 182.828521][ T9276] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 182.895149][ T9274] IPVS: ftp: loaded support on port[0] = 21 10:21:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket(0x1f, 0x3, 0xfff) setsockopt$inet_msfilter(r1, 0x0, 0x29, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x2, 0x3000300}], 0x1, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x2) accept(r0, 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {0xffffffffffffffff, 0x2000000000000000, 0x300000000000000}], 0x2, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140), 0x8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000ab80)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r2, 0x111, 0x4, 0x0, 0x4) 10:21:12 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) r1 = socket$inet6(0xa, 0x0, 0xb8c) ioctl(r1, 0x8912, &(0x7f0000000200)='\x00\x00\x00\x00\x00') unshare(0x40000000) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000280)={'ip6tnl0\x00', {0x2, 0x0, @remote}}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r3 = socket$inet(0x2, 0x6, 0x0) r4 = accept(r3, &(0x7f0000002840)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000028c0)=0x80) shutdown(r4, 0x1) getsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, &(0x7f0000002900), &(0x7f0000002940)=0x4) setsockopt$sock_int(r4, 0x1, 0x21, &(0x7f0000000380)=0x1, 0x4) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, 0x0) sendto$llc(r4, &(0x7f0000000100)="f970073b521a3a2059fcfb4e8ff5daaa892b23d0d93e42e29fd18b0a0ba812eee04266ea1e381a4bb2e397868f69542dd70dd9c732d82d1fb2fc114f477c5628dfd9882cb1704a9f32aac44aae8374041822b9186cf14d60459bd23b2cdfa2331560f6603715660f40eb2abb6eb4ac55a1b1b79c6b0cf8b2b9318c3851c8c082044b202dfddf065073e5b86df813839f8469d5e3897560064588b8857deb8aa08bb97eab5a3c887c75722b8f29c0676355437301c7bab02cae987fb632bc787275cc10ffa7d27aec6dde9675ce109785c50042c06113", 0xd6, 0x800, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, &(0x7f0000000740)) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={'lo\x00', {0x2, 0x0, @dev}}) r5 = openat$cgroup(r2, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r5, 0x6, 0x1, 0x0, 0x0}, 0x20) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x80001) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f00000005c0)=ANY=[]) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) 10:21:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'gretap0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:21:13 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket(0x1f, 0x3, 0xfff) setsockopt$inet_msfilter(r1, 0x0, 0x29, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x2, 0x3000300}], 0x1, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x2) accept(r0, 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {0xffffffffffffffff, 0x2000000000000000, 0x300000000000000}], 0x2, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140), 0x8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000ab80)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r2, 0x111, 0x4, 0x0, 0x4) [ 183.087388][ T9285] IPVS: ftp: loaded support on port[0] = 21 10:21:13 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$unix(0x1, 0x800000000005, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmsg$unix(r2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r1, @ANYRES64=r2], 0x1c}, 0x0) accept4$ax25(r1, 0x0, 0x0, 0x0) close(r1) close(r0) 10:21:13 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$unix(0x1, 0x800000000005, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmsg$unix(r2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r1, @ANYRES64=r2], 0x1c}, 0x0) accept4$ax25(r1, 0x0, 0x0, 0x0) close(r1) close(r0) 10:21:13 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$unix(0x1, 0x800000000005, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmsg$unix(r2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r1, @ANYRES64=r2], 0x1c}, 0x0) accept4$ax25(r1, 0x0, 0x0, 0x0) close(r1) close(r0) 10:21:16 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket(0x1f, 0x3, 0xfff) setsockopt$inet_msfilter(r1, 0x0, 0x29, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x2, 0x3000300}], 0x1, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x2) accept(r0, 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {0xffffffffffffffff, 0x2000000000000000, 0x300000000000000}], 0x2, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140), 0x8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000ab80)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r2, 0x111, 0x4, 0x0, 0x4) 10:21:16 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket(0x1f, 0x3, 0xfff) setsockopt$inet_msfilter(r1, 0x0, 0x29, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x2, 0x3000300}], 0x1, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x2) accept(r0, 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {0xffffffffffffffff, 0x2000000000000000, 0x300000000000000}], 0x2, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140), 0x8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000ab80)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r2, 0x111, 0x4, 0x0, 0x4) 10:21:16 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$unix(0x1, 0x800000000005, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmsg$unix(r2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r1, @ANYRES64=r2], 0x1c}, 0x0) accept4$ax25(r1, 0x0, 0x0, 0x0) close(r1) close(r0) 10:21:16 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) r1 = socket$inet6(0xa, 0x0, 0xb8c) ioctl(r1, 0x8912, &(0x7f0000000200)='\x00\x00\x00\x00\x00') unshare(0x40000000) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000280)={'ip6tnl0\x00', {0x2, 0x0, @remote}}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r3 = socket$inet(0x2, 0x6, 0x0) r4 = accept(r3, &(0x7f0000002840)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000028c0)=0x80) shutdown(r4, 0x1) getsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, &(0x7f0000002900), &(0x7f0000002940)=0x4) setsockopt$sock_int(r4, 0x1, 0x21, &(0x7f0000000380)=0x1, 0x4) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, 0x0) sendto$llc(r4, &(0x7f0000000100)="f970073b521a3a2059fcfb4e8ff5daaa892b23d0d93e42e29fd18b0a0ba812eee04266ea1e381a4bb2e397868f69542dd70dd9c732d82d1fb2fc114f477c5628dfd9882cb1704a9f32aac44aae8374041822b9186cf14d60459bd23b2cdfa2331560f6603715660f40eb2abb6eb4ac55a1b1b79c6b0cf8b2b9318c3851c8c082044b202dfddf065073e5b86df813839f8469d5e3897560064588b8857deb8aa08bb97eab5a3c887c75722b8f29c0676355437301c7bab02cae987fb632bc787275cc10ffa7d27aec6dde9675ce109785c50042c06113", 0xd6, 0x800, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, &(0x7f0000000740)) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={'lo\x00', {0x2, 0x0, @dev}}) r5 = openat$cgroup(r2, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r5, 0x6, 0x1, 0x0, 0x0}, 0x20) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x80001) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f00000005c0)=ANY=[]) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) 10:21:16 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000040)=[{r0, 0x2, 0x3000300}], 0x1, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {0xffffffffffffffff, 0x800000000000000}], 0x2, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140)={0x8}, 0x8) accept4(r0, &(0x7f0000000380)=@ethernet={0x0, @local}, &(0x7f0000000400)=0x80, 0x0) socket$netlink(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000580)={'dummy0\x00'}) getuid() sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000ab80)={0x0, 0x0, 0x0}, 0x0) ioctl$SIOCAX25CTLCON(0xffffffffffffffff, 0x89e8, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000300), 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) r1 = accept4(r0, &(0x7f0000000180)=@isdn, &(0x7f0000000280)=0x80, 0x800) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000440)={&(0x7f0000000200), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, 0x0, 0x82) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, 0x0, 0x0) 10:21:16 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) r1 = socket$inet6(0xa, 0x0, 0xb8c) ioctl(r1, 0x8912, &(0x7f0000000200)='\x00\x00\x00\x00\x00') unshare(0x40000000) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000280)={'ip6tnl0\x00', {0x2, 0x0, @remote}}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r3 = socket$inet(0x2, 0x6, 0x0) r4 = accept(r3, &(0x7f0000002840)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000028c0)=0x80) shutdown(r4, 0x1) getsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, &(0x7f0000002900), &(0x7f0000002940)=0x4) setsockopt$sock_int(r4, 0x1, 0x21, &(0x7f0000000380)=0x1, 0x4) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, 0x0) sendto$llc(r4, &(0x7f0000000100)="f970073b521a3a2059fcfb4e8ff5daaa892b23d0d93e42e29fd18b0a0ba812eee04266ea1e381a4bb2e397868f69542dd70dd9c732d82d1fb2fc114f477c5628dfd9882cb1704a9f32aac44aae8374041822b9186cf14d60459bd23b2cdfa2331560f6603715660f40eb2abb6eb4ac55a1b1b79c6b0cf8b2b9318c3851c8c082044b202dfddf065073e5b86df813839f8469d5e3897560064588b8857deb8aa08bb97eab5a3c887c75722b8f29c0676355437301c7bab02cae987fb632bc787275cc10ffa7d27aec6dde9675ce109785c50042c06113", 0xd6, 0x800, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, &(0x7f0000000740)) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={'lo\x00', {0x2, 0x0, @dev}}) r5 = openat$cgroup(r2, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r5, 0x6, 0x1, 0x0, 0x0}, 0x20) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x80001) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f00000005c0)=ANY=[]) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) 10:21:16 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000000c0)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x5, 0x0, {0xd}}}, 0x30}}, 0x0) [ 186.965651][ T9351] IPVS: ftp: loaded support on port[0] = 21 10:21:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x2a, 0x1, 0x0, 0x0, {0x2001}, [@nested={0x8, 0x9, [@generic="c9"]}]}, 0x1c}}, 0x0) [ 187.119351][ T9374] IPVS: ftp: loaded support on port[0] = 21 10:21:17 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x25fa) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 10:21:17 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket(0x1f, 0x3, 0xfff) setsockopt$inet_msfilter(r1, 0x0, 0x29, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x2, 0x3000300}], 0x1, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x2) accept(r0, 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {0xffffffffffffffff, 0x2000000000000000, 0x300000000000000}], 0x2, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140), 0x8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000ab80)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r2, 0x111, 0x4, 0x0, 0x4) 10:21:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket(0x1f, 0x3, 0xfff) setsockopt$inet_msfilter(r1, 0x0, 0x29, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x2, 0x3000300}], 0x1, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x2) accept(r0, 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {0xffffffffffffffff, 0x2000000000000000, 0x300000000000000}], 0x2, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140), 0x8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000ab80)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r2, 0x111, 0x4, 0x0, 0x4) 10:21:17 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) listen(r0, 0x6) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x11}}}}}}}, 0x0) 10:21:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@timestamp={0xffffff86, 0x8, 0x0, 0x0, 0x0, [{}]}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) [ 187.845914][ T9403] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 10:21:17 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bind$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)=""/199, 0xc7}, 0x0) sendmmsg$unix(r0, &(0x7f0000000240)=[{&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f00000001c0)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18}], 0x1, 0x0) 10:21:18 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) r1 = socket$inet6(0xa, 0x0, 0xb8c) ioctl(r1, 0x8912, &(0x7f0000000200)='\x00\x00\x00\x00\x00') unshare(0x40000000) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000280)={'ip6tnl0\x00', {0x2, 0x0, @remote}}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r3 = socket$inet(0x2, 0x6, 0x0) r4 = accept(r3, &(0x7f0000002840)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000028c0)=0x80) shutdown(r4, 0x1) getsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, &(0x7f0000002900), &(0x7f0000002940)=0x4) setsockopt$sock_int(r4, 0x1, 0x21, &(0x7f0000000380)=0x1, 0x4) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, 0x0) sendto$llc(r4, &(0x7f0000000100)="f970073b521a3a2059fcfb4e8ff5daaa892b23d0d93e42e29fd18b0a0ba812eee04266ea1e381a4bb2e397868f69542dd70dd9c732d82d1fb2fc114f477c5628dfd9882cb1704a9f32aac44aae8374041822b9186cf14d60459bd23b2cdfa2331560f6603715660f40eb2abb6eb4ac55a1b1b79c6b0cf8b2b9318c3851c8c082044b202dfddf065073e5b86df813839f8469d5e3897560064588b8857deb8aa08bb97eab5a3c887c75722b8f29c0676355437301c7bab02cae987fb632bc787275cc10ffa7d27aec6dde9675ce109785c50042c06113", 0xd6, 0x800, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, &(0x7f0000000740)) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={'lo\x00', {0x2, 0x0, @dev}}) r5 = openat$cgroup(r2, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r5, 0x6, 0x1, 0x0, 0x0}, 0x20) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x80001) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f00000005c0)=ANY=[]) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) [ 188.035175][ T9403] syz-executor.5 (9403) used greatest stack depth: 22640 bytes left [ 188.225947][ T9422] IPVS: ftp: loaded support on port[0] = 21 10:21:20 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) r1 = socket$inet6(0xa, 0x0, 0xb8c) ioctl(r1, 0x8912, &(0x7f0000000200)='\x00\x00\x00\x00\x00') unshare(0x40000000) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000280)={'ip6tnl0\x00', {0x2, 0x0, @remote}}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r3 = socket$inet(0x2, 0x6, 0x0) r4 = accept(r3, &(0x7f0000002840)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000028c0)=0x80) shutdown(r4, 0x1) getsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, &(0x7f0000002900), &(0x7f0000002940)=0x4) setsockopt$sock_int(r4, 0x1, 0x21, &(0x7f0000000380)=0x1, 0x4) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, 0x0) sendto$llc(r4, &(0x7f0000000100)="f970073b521a3a2059fcfb4e8ff5daaa892b23d0d93e42e29fd18b0a0ba812eee04266ea1e381a4bb2e397868f69542dd70dd9c732d82d1fb2fc114f477c5628dfd9882cb1704a9f32aac44aae8374041822b9186cf14d60459bd23b2cdfa2331560f6603715660f40eb2abb6eb4ac55a1b1b79c6b0cf8b2b9318c3851c8c082044b202dfddf065073e5b86df813839f8469d5e3897560064588b8857deb8aa08bb97eab5a3c887c75722b8f29c0676355437301c7bab02cae987fb632bc787275cc10ffa7d27aec6dde9675ce109785c50042c06113", 0xd6, 0x800, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, &(0x7f0000000740)) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={'lo\x00', {0x2, 0x0, @dev}}) r5 = openat$cgroup(r2, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r5, 0x6, 0x1, 0x0, 0x0}, 0x20) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x80001) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f00000005c0)=ANY=[]) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) 10:21:20 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bind$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)=""/199, 0xc7}, 0x0) sendmmsg$unix(r0, &(0x7f0000000240)=[{&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f00000001c0)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18}], 0x1, 0x0) 10:21:20 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) listen(r0, 0x6) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x11}}}}}}}, 0x0) 10:21:20 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) listen(r0, 0x6) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x11}}}}}}}, 0x0) 10:21:20 executing program 0: socket$key(0xf, 0x3, 0x2) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2000000001, 0x3) sendmmsg(r0, &(0x7f0000000480), 0x4000000000002b4, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 10:21:20 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000200)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}, @broadcast}, @gre={{0x0, 0x0, 0x1, 0x0, 0xb, 0xffffffffffffffff, 0x0, 0x8}, {}, {}, {0x0, 0x57}}}}}}, 0x0) 10:21:20 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) listen(r0, 0x6) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x11}}}}}}}, 0x0) [ 190.255127][ T9438] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 10:21:20 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bind$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)=""/199, 0xc7}, 0x0) sendmmsg$unix(r0, &(0x7f0000000240)=[{&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f00000001c0)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18}], 0x1, 0x0) 10:21:20 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r0, 0x65, 0x6, 0x0, 0x4) 10:21:20 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) listen(r0, 0x6) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x11}}}}}}}, 0x0) 10:21:20 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) listen(r0, 0x6) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x11}}}}}}}, 0x0) 10:21:20 executing program 0: socket$key(0xf, 0x3, 0x2) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2000000001, 0x3) sendmmsg(r0, &(0x7f0000000480), 0x4000000000002b4, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 190.456982][ T9448] IPVS: ftp: loaded support on port[0] = 21 10:21:20 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) listen(r0, 0x6) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x11}}}}}}}, 0x0) 10:21:20 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bind$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)=""/199, 0xc7}, 0x0) sendmmsg$unix(r0, &(0x7f0000000240)=[{&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f00000001c0)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18}], 0x1, 0x0) 10:21:20 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='bbr\x00', 0x4) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, 0x0, &(0x7f0000000040)) 10:21:20 executing program 0: socket$key(0xf, 0x3, 0x2) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2000000001, 0x3) sendmmsg(r0, &(0x7f0000000480), 0x4000000000002b4, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 10:21:21 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0x2, 0x0, &(0x7f0000000040)=0x311e2db025aeeea9) 10:21:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xffffffffffffffcc) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000000)={'eql\x00\x00\x00\x00\x005\x00', @ifru_flags}) 10:21:21 executing program 0: socket$key(0xf, 0x3, 0x2) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2000000001, 0x3) sendmmsg(r0, &(0x7f0000000480), 0x4000000000002b4, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 10:21:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a067fffffff81004e220000000058000b4824ca945f64009400050028925aa8000000000000008000f0fffeffe809000000fff5dd00000010000100070aa8f7410400000000fcff", 0x58}], 0x1) 10:21:22 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) connect$unix(r0, 0x0, 0x0) 10:21:22 executing program 2: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x3, @initdev}, 0x10) listen(r0, 0x100000001) getpeername(r0, 0x0, &(0x7f00000000c0)) 10:21:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xffffffffffffffcc) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000000)={'eql\x00\x00\x00\x00\x005\x00', @ifru_flags}) 10:21:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f0000def000/0xe000)=nil, 0xe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000baa000/0x3000)=nil, 0x3000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000977000/0x200000)=nil, 0x200000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) 10:21:22 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x3, 0x3c8, [0x20000100, 0x0, 0x0, 0x20000328, 0x20000358], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/968]}, 0x440) 10:21:22 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) pipe(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x70000000}) recvfrom$x25(0xffffffffffffffff, &(0x7f00000000c0)=""/48, 0x30, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f00000002c0)=""/253, 0xfd, 0x40010002, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000070607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:21:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xffffffffffffffcc) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000000)={'eql\x00\x00\x00\x00\x005\x00', @ifru_flags}) 10:21:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r1 = socket$inet(0x2, 0x3, 0x1c) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0ad401003c123f319bd070") sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x2a, 0x1, 0x0, 0x0, {0x5}, [@nested={0x8, 0x9, [@generic="c9"]}]}, 0x1c}}, 0x0) 10:21:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000005, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000640)={0x0, 0x0, 0x695, 0x7fd}) pwrite64(r4, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x200, 0x3200) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfffffcbe) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000000000, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r5, 0x84, 0x1e, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_aout(r1, &(0x7f0000000b00)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}}, 0xfe10) 10:21:22 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x331, 0x1c00) [ 192.362191][ T9516] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 192.395412][ T9516] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 10:21:22 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000ec0)=0x10) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x7b, &(0x7f0000000140)={r1, @in={{0x2, 0x0, @empty}}}, 0x90) 10:21:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xffffffffffffffcc) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000000)={'eql\x00\x00\x00\x00\x005\x00', @ifru_flags}) 10:21:22 executing program 3: ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000180)={'vxcan1\x00', {0x2, 0x0, @empty}}) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000f4dff4), 0x74c, &(0x7f0000000040)={&(0x7f0000000080)=@migrate={0x15c, 0x21, 0x1, 0x0, 0x0, {{@in6=@ipv4={[], [], @multicast1}, @in6=@dev}}, [@migrate={0x10c}]}, 0x15c}}, 0x0) 10:21:22 executing program 2: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x3, @initdev}, 0x10) listen(r0, 0x100000001) getpeername(r0, 0x0, &(0x7f00000000c0)) 10:21:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffad, 0xa}, [@ldst={0x7}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) 10:21:22 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x0e\x00', 0xffffffffffffffdb}) connect$inet(0xffffffffffffffff, 0x0, 0x0) [ 192.775250][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 192.775264][ T26] audit: type=1804 audit(1558952482.738:31): pid=9544 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir806662790/syzkaller.bIdOHK/15/memory.events" dev="sda1" ino=16640 res=1 10:21:23 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000780)={0x2, &(0x7f0000000000)=[{0x3c}, {0x80000006}]}, 0x10) [ 192.993431][ T9563] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.001341][ T9563] bridge0: port 1(bridge_slave_0) entered disabled state 10:21:23 executing program 2: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x3, @initdev}, 0x10) listen(r0, 0x100000001) getpeername(r0, 0x0, &(0x7f00000000c0)) 10:21:23 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) getsockopt$llc_int(r0, 0x10c, 0x7, &(0x7f0000000000), &(0x7f0000000080)=0x4) 10:21:23 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$inet6(0xa, 0x1000000002, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000002c0)=0x581, 0x4) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000100)={@loopback}, 0x14) setsockopt$inet6_int(r2, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2002) sendmmsg(r0, &(0x7f00000000c0), 0x182, 0x0) [ 193.463001][ T9565] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.470217][ T9565] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.477642][ T9565] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.484796][ T9565] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.499926][ T9565] device bridge0 entered promiscuous mode [ 193.753974][ T9563] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.761285][ T9563] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.768633][ T9563] device bridge0 left promiscuous mode [ 193.828723][ T9565] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.836031][ T9565] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.843559][ T9565] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.850674][ T9565] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.858654][ T9565] device bridge0 entered promiscuous mode 10:21:23 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$inet6(0xa, 0x1000000002, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000002c0)=0x581, 0x4) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000100)={@loopback}, 0x14) setsockopt$inet6_int(r2, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2002) sendmmsg(r0, &(0x7f00000000c0), 0x182, 0x0) 10:21:23 executing program 2: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x3, @initdev}, 0x10) listen(r0, 0x100000001) getpeername(r0, 0x0, &(0x7f00000000c0)) 10:21:23 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) getsockopt$llc_int(r0, 0x10c, 0x7, &(0x7f0000000000), &(0x7f0000000080)=0x4) 10:21:23 executing program 1: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x17f) write(r0, &(0x7f0000000140)="2400000022001f0214f9f407008000000000000010000400feffffff0800000000000000", 0x24) 10:21:23 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$inet6(0xa, 0x1000000002, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000002c0)=0x581, 0x4) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000100)={@loopback}, 0x14) setsockopt$inet6_int(r2, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2002) sendmmsg(r0, &(0x7f00000000c0), 0x182, 0x0) 10:21:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000005, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000640)={0x0, 0x0, 0x695, 0x7fd}) pwrite64(r4, &(0x7f0000000200)="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", 0x200, 0x3200) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfffffcbe) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000000000, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r5, 0x84, 0x1e, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_aout(r1, &(0x7f0000000b00)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}}, 0xfe10) [ 193.879678][ T26] audit: type=1804 audit(1558952483.828:32): pid=9547 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir806662790/syzkaller.bIdOHK/15/memory.events" dev="sda1" ino=16640 res=1 [ 193.967121][ T26] audit: type=1800 audit(1558952483.838:33): pid=9547 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="memory.events" dev="sda1" ino=16640 res=0 10:21:24 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$inet6(0xa, 0x1000000002, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000002c0)=0x581, 0x4) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000100)={@loopback}, 0x14) setsockopt$inet6_int(r2, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2002) sendmmsg(r0, &(0x7f00000000c0), 0x182, 0x0) 10:21:24 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$inet6(0xa, 0x1000000002, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000002c0)=0x581, 0x4) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000100)={@loopback}, 0x14) setsockopt$inet6_int(r2, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2002) sendmmsg(r0, &(0x7f00000000c0), 0x182, 0x0) 10:21:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000005, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000640)={0x0, 0x0, 0x695, 0x7fd}) pwrite64(r4, &(0x7f0000000200)="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", 0x200, 0x3200) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfffffcbe) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000000000, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r5, 0x84, 0x1e, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_aout(r1, &(0x7f0000000b00)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}}, 0xfe10) 10:21:24 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) getsockopt$llc_int(r0, 0x10c, 0x7, &(0x7f0000000000), &(0x7f0000000080)=0x4) 10:21:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000005, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000640)={0x0, 0x0, 0x695, 0x7fd}) pwrite64(r4, &(0x7f0000000200)="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", 0x200, 0x3200) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfffffcbe) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000000000, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r5, 0x84, 0x1e, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_aout(r1, &(0x7f0000000b00)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}}, 0xfe10) 10:21:24 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$inet6(0xa, 0x1000000002, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000002c0)=0x581, 0x4) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000100)={@loopback}, 0x14) setsockopt$inet6_int(r2, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2002) sendmmsg(r0, &(0x7f00000000c0), 0x182, 0x0) 10:21:24 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$inet6(0xa, 0x1000000002, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000002c0)=0x581, 0x4) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000100)={@loopback}, 0x14) setsockopt$inet6_int(r2, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2002) sendmmsg(r0, &(0x7f00000000c0), 0x182, 0x0) [ 194.324962][ T26] audit: type=1804 audit(1558952484.288:34): pid=9616 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir806662790/syzkaller.bIdOHK/16/memory.events" dev="sda1" ino=16635 res=1 10:21:24 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) getsockopt$llc_int(r0, 0x10c, 0x7, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 194.469730][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 194.689943][ T26] audit: type=1804 audit(1558952484.658:35): pid=9626 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir746461179/syzkaller.iLAvIO/25/memory.events" dev="sda1" ino=16633 res=1 [ 194.794751][ T26] audit: type=1804 audit(1558952484.688:36): pid=9625 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir722764288/syzkaller.8JriU9/28/memory.events" dev="sda1" ino=16631 res=1 10:21:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000005, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000640)={0x0, 0x0, 0x695, 0x7fd}) pwrite64(r4, &(0x7f0000000200)="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", 0x200, 0x3200) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfffffcbe) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000000000, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r5, 0x84, 0x1e, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_aout(r1, &(0x7f0000000b00)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}}, 0xfe10) 10:21:25 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$inet6(0xa, 0x1000000002, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000002c0)=0x581, 0x4) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000100)={@loopback}, 0x14) setsockopt$inet6_int(r2, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2002) sendmmsg(r0, &(0x7f00000000c0), 0x182, 0x0) 10:21:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000005, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000640)={0x0, 0x0, 0x695, 0x7fd}) pwrite64(r4, &(0x7f0000000200)="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", 0x200, 0x3200) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfffffcbe) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000000000, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r5, 0x84, 0x1e, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_aout(r1, &(0x7f0000000b00)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}}, 0xfe10) 10:21:25 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB='9:2\t'], 0x4) 10:21:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x4, &(0x7f0000000380)=""/73, &(0x7f0000000400)=0x49) 10:21:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000005, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000640)={0x0, 0x0, 0x695, 0x7fd}) pwrite64(r4, &(0x7f0000000200)="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", 0x200, 0x3200) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfffffcbe) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000000000, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r5, 0x84, 0x1e, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_aout(r1, &(0x7f0000000b00)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}}, 0xfe10) 10:21:26 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000600)={0x1, &(0x7f0000000300)=[{}]}) 10:21:26 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$inet6(0xa, 0x1000000002, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000002c0)=0x581, 0x4) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000100)={@loopback}, 0x14) setsockopt$inet6_int(r2, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2002) sendmmsg(r0, &(0x7f00000000c0), 0x182, 0x0) 10:21:26 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB='9:2\t'], 0x4) 10:21:26 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000600)={0x1, &(0x7f0000000300)=[{}]}) [ 196.351702][ T26] audit: type=1804 audit(1558952486.318:37): pid=9656 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir722764288/syzkaller.8JriU9/29/memory.events" dev="sda1" ino=16661 res=1 10:21:26 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$inet6(0xa, 0x1000000002, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000002c0)=0x581, 0x4) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000100)={@loopback}, 0x14) setsockopt$inet6_int(r2, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2002) sendmmsg(r0, &(0x7f00000000c0), 0x182, 0x0) 10:21:26 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB='9:2\t'], 0x4) [ 196.448001][ T26] audit: type=1804 audit(1558952486.348:38): pid=9654 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir746461179/syzkaller.iLAvIO/26/memory.events" dev="sda1" ino=16660 res=1 [ 196.533636][ T26] audit: type=1804 audit(1558952486.348:39): pid=9652 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir806662790/syzkaller.bIdOHK/17/memory.events" dev="sda1" ino=16659 res=1 10:21:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000005, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000640)={0x0, 0x0, 0x695, 0x7fd}) pwrite64(r4, &(0x7f0000000200)="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", 0x200, 0x3200) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfffffcbe) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000000000, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r5, 0x84, 0x1e, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_aout(r1, &(0x7f0000000b00)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}}, 0xfe10) 10:21:27 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000600)={0x1, &(0x7f0000000300)=[{}]}) 10:21:27 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB='9:2\t'], 0x4) 10:21:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x15, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 10:21:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000005, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000640)={0x0, 0x0, 0x695, 0x7fd}) pwrite64(r4, &(0x7f0000000200)="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", 0x200, 0x3200) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfffffcbe) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000000000, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r5, 0x84, 0x1e, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_aout(r1, &(0x7f0000000b00)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}}, 0xfe10) 10:21:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000005, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000640)={0x0, 0x0, 0x695, 0x7fd}) pwrite64(r4, &(0x7f0000000200)="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", 0x200, 0x3200) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfffffcbe) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000000000, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r5, 0x84, 0x1e, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_aout(r1, &(0x7f0000000b00)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}}, 0xfe10) 10:21:27 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000600)={0x1, &(0x7f0000000300)=[{}]}) 10:21:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256-generic\x00'}, 0x58) socket$alg(0x26, 0x5, 0x0) r1 = accept$alg(r0, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000074c0)='nbd\x00') sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can={0x1d, 0x0, 0x3f00000000000000}, 0x200056d0, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x16f, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 10:21:27 executing program 3: r0 = socket$inet(0x15, 0x80005, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x0, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000012000), 0x0, &(0x7f0000024fb8)=[{0x10}], 0xfe}, 0x0) 10:21:27 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@fadd={0x58, 0x114, 0x6, {{}, 0x0, 0x0}}, @zcopy_cookie={0x18}], 0x70}, 0x0) 10:21:27 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900840000000a000000000000000000000000000000000000000000000000000000000000000200010000000000000006160000000005000500000000000a00000000000000ff0200000000000000000000000000010000000000000000"], 0x98}}, 0x0) [ 197.650165][ T26] audit: type=1804 audit(1558952487.608:40): pid=9698 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir746461179/syzkaller.iLAvIO/27/memory.events" dev="sda1" ino=16677 res=1 10:21:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x15, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x1c}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 197.797084][ T26] kauditd_printk_skb: 1 callbacks suppressed [ 197.797106][ T26] audit: type=1804 audit(1558952487.758:42): pid=9696 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir722764288/syzkaller.8JriU9/30/memory.events" dev="sda1" ino=16517 res=1 10:21:28 executing program 4: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000004240)=ANY=[@ANYBLOB="ec2900003000000826bd7000fddbdf250001ec00801001007c10140000000c000100736b626564697400640002000800050001000000080005000000000008000300000008000800070000000000080003000300ffff080007000600000008000500070000000800070007000000180002000101000004000000060000000400000000000000080003000600f1ff04100600b9b0b0210dc0dc7afecfc994ffac3b2a0428a540fc6572e7a6553dd5827da6457a29ce2f51de9bf6c18dab3716148592842afe9e240d26104e012ffb9eb2ffc836a9b04d04a985b5ae8cb8406f8334524a768bb47df060121afb7884f819ed9c102fa7c406d952f5516c72c9e212fe1598947b02af8f273c49ff85b2e9f599c5f5510d63a473844c1d1d6f9ddffcdd879984d0bbb71db65b2ffd404d69b81049c8c1e87c42d6054c17884044cff1f65f8082b72b354d997fb7380959999119d0cb2805caace97c7d82674c29641ef324df1ca457fecf48df6796a106586918b23447f957d0922bb78f440650f2945e6fb70e15f568beeef49fe4472abd84bd9c19447480d30fbc56581a11c2ba5360d33ebce680a147dc40fd8385bb50d5159e378a3e6a294d862b9a75d6a814176fae22a338826741d74774fd0ff8998a612e05340f72260648e8a0d6cdf5f8b462d5adb9b0dbc6e16bcd4c531ec07797604f007099b24d2d367c6f228386ee89ace7bc831831372b65c5810e0b2b5d59c6df853b16da65ef010bf7e7c88fe0e8aaf405882b1c03118a30387a137c3d9265f5c744c64e99012e720485c751114006bb2f212d371c14d0314994d4b22126214289dea9beeb913fbfa5b4cb63b9fc1345f8d419ecff57ded4d0cbd28916e74e4d8590a7c6b3971fc6814a5d473f3523fde474f6a2877c10ad15d0a0c4eca4f0cd72421a85c3b027d406788bc0249132c74a8abc0e95c0c106a7c1b2c0eb8ba54602bc6d176d1afa2f7a6ffe643f31b3c17497099447054a321d7f831a7eeae3b1cb1c51f44210ce9b0afaffa41e884b12e97be569daf187149c497a53f1d5a61b865edbbd9ca25c6a9d15e81e6cb2c16578a5b09617c015dcd2acf7060394ce26108ab26910d22227522c46223fe3eb4b0a84d93ae78b00500c27e26641e0b1e19db5d62fc588c739bcf1bb820072e4af6c52f8433ef913486d7d0abf6affdd16ead7e534106f0a219dbb5db7c41f3cbad605e0594d12ce89bf2a67b45853c109960638bd6083a4fcf14069b285f46fe7d1564c5ee469f24ec4c197c7ff507eebbfcdf039798cc8283656156fb6e3047150296d50d25d2fdf0d0fd224513e62fef0505569f8123d446ef4ea16dedfb08563a7136ce6b6f962c51c7657cd58e3e8096eefda2672bcda7724d076afdc5a9ac0e111b9b330046d805125bc28dc2564565dfbb9789647e02ead0c35a751a8e4d86cde7d0578e359ee22d139f38151f9efb70fd9e49eebaf52a8550b1d7242f0c9480c1aabe71996256224dfada012f17f1af6ff413073a126da1cdb1aa4b65e9b4e918c113156138ddbb1321a61c1e51f050546717576836bf103f84916e6999a03081d6076348b30a9e6bb118bffc1f5ecdf45484f1dc57087b9479d0347c792c2223bcfebb3dc7605bda744eae9372c98a4e55f12dbf7d48b13a808050bae0ded040d4d49be12bc0b093696d7268d4ffae758e1111dd494d9728b2165835ad3093c54c0d6e60d0f407d01fe2d2c35160a6ec703057d7aac2364b58cf056c85c001077563720d2ab17e8bc1b9faaccddda66d569db050be60b12494e5aa370ee126c917a3a9cefa1e16df7c04c98aaa145844c9700a85ec9ed86116aa743c691f94b57de2fd1082ed6c3d3f600240e0d1b3d4f2a7983249124064368f8b3fb6c6583d0f1c84410eaa12d0db0c1c03cbd760c2e3e6d9cf32975f91de4dcc6398acf9c1d068652493063f7078c173df6244d6d18f0829d87b876cc269efcd70946ce27c7d1489f2aed53eefb284ee4e57d68f2e8c4962470ce3287bd19299a568924dce3df735b4975de4b7da8e51cf685f221157c576b5cce1ac2ce55d291fd932f54356bb09bdcfffb8ecbdee36f1a600bc79cd765d2d74d79f203f56e15fe8b62695230f654423c44ea63060bdc15954d3989031f605628c0879fa02010fbf64a2b393299ba121ab8306487b05894c0447c64a3b77e0ae38cf74cd670d2fc52b5b26b0391626d7b3f4454694d904c3481d371c99a09482dfe4d72b0509be5f01ed5f07f2fe70376b6e12e1f8e5d0959681ffc6739a873bdf7d6d45f58a698a99bf412a722c78b16faaeed9f36d5b5f09aa980bbf135a4f1856e157acf08073e316818000919c2e9dc5679c7b1ee56243cce68f844e9c604092e09a0dead80340e04031a1aaab24b7f64a21fda0eb95b8e6b4d5956f6c63b79d694948e7fb6fa8e10818bb1e29b05b5d6d459559486e973759d8489750b64b8422bcf25aa02dc834697888b4249dc0b2037eedfa541963048c8640cee28ce4fedf26911b9e902995b86d3c2311c6232f61d77c6ae60f6dea30c4b506e4eeb8d4351c90a0b2b9dfd983d3b8ac48e4b618df67903a6e806c07cb571800b0e90dff5d045bf15ed4c45f82aa9ea6cb46016bb69125b1c78c056f33fcb843acd0e88002f88c3fe4b1cc5fa993603284a542bee9721f80348de2ee88b124f8191789d0b1895e2fc66af3cf187af8dfa647ab45865169ede15237b809391832eaae6ef20bf717aac5abca70dbf313c55d4673216decb601a6af7403c4371b70dd427459d497ee5149989f8ac71d3ab9f2729338063acd284a30367a7000328389a12d1db75d1305fda55113a46e623b3625f52b46a7ab40b276ace6c0b2dacfc107b64c83a6088352f667214283cbf56630619cd95d885083fdc23afd8de3e1e003725004cef09c3418f4a130ebce62d6d497959213439256c37659a70a20e6112073e6483648f01324b7012adabc5c348527b42fbdb21d4aa3b85cffc4909409575e8b55c89235612c3eb9026d8859755853eec87e0e157be90982a9e50b50e0cd64c78c508f3f455fd9099eb1d74bdfcd0bcf17566252f31e782adbb22b9c82709b6b284ce33f86b00c27886a461c81d404dcf8305c3dba474f9d9b012cb3e06763772f9c406eb53e466394223ced6333c7f539b053332786763084f90ac9849fa33b4d9c3d46b7fa70a1ceb2177694ba326bf8783162479338bcfe9b86c8e5b544928343f356fd28625d85e4790e006e8146e4191bed1bf6d7e338692dcddae6223573c02ceeca53a89c1da24b50df95aa18390adb405e7979832f19f268ba52847de3b01ef7efc22fbe5573e1d287552630ad09863943977ba99ed91983f6dac0d950bd744960ca2be7b26a3c86b062d2337834cf067f7db7746d382e2c98fb692eb0df5bc28d5652815ff19f93cee356f25685d1b3f544fdcfb1679460a6c28834edbc58d36347b137c76dfac57a58f6d373e1f313964d22b442527373784fd46952c61f8a6034b1aa0cbbd75db782123043ebad6286e3abad7f2ef776533e7cabac1daefc81f7bba4a4125ba28f55e6dca4505fd5f9911c9fc3f55ff112b38c7d1109828bd1dd21a442b23e4aa6fe0a451ea836c27b464932b8072b3443d33ac868d2d2984cd2907cb8a6a4393181e5aafc55d415a34a7fb3f6a75eca863c15cedf69182ca8b005ee5bfef4bcdbb4b9551e4daf61fdc5305a6d05b892acff7f5d3a3e662d5da9939360b77bd753710fdf4ab65d4453115d5e7fbf36eeae1dc7b5ec9c8b7f536e67813970476b4c1a4b41dfc3cebc3f0b758445a569878738a284b98d1e7a781cae1286b2827f1cf2f71d5c91ec0685709264e0146dbf660e625e21ff37bba5cbbe5ee2fb74e10bc1b52cbd419e9d8875b0aaa38f55bc591862df951b780de1c6390b7688bdb94daf1e49b76b24f55ee4eada2cdefe1dce1cb86d0926c0eb4121ddffdf5ab55c18ab2dc28992ed8768ca1d8dd1fcf98dd8420f3708ff0f9a499ad289a16d3561a7e7f577b5cc069a8d8692f3bfd02d1a69c68af06470e57740e0d6bd0abe91df6c44ee2d4564134a98a138474093922d69da50302df402e3f4810923b16a3e2ae022d3f86b3aace77441c2bf708cae43ca8bda2dad259c8f89d6d18a3d3a02ef7acbc01316bc2235979c6942c187e9b0ee7b335daa8a26433a22cb947c25679945dcbc946730d244bb2526244bda4a0e18bbdc10a1537cacefe62e16ae50ee89a718789ed4e25219ef1df08d6562790c556909e359563cf7bc49551c7d30e5b83dbd4e09b5d94a9488df95ea631ae9547bd5d3fbf6104e884d101ca23827946866c4f02c4efc4a673863d6205252ce2dabfd047098a92d4dcc1a741a49b95ab10fea824322b661968df53851a898e398a01493a18554c88892493b37061b72bc7050933f40b456ef185d80aaa25aafb482f8b20f36c7ffe527ca457af98ede492b642f6ee854c67e3a3db3c13aecae71fe2aeb3cdb3dc2f9ca04be7b5614b5efd5a036d683713b3fc018871a6ce5a83c8a098ad8218c04992b908aaf7c3ee8daf5ad7ac531b634c56597d041ab59fc14086a8d28aa34c80488c539e6c2cd6e3fee4eb886dbb7a1ad7f188b16c70ea7dfce3d34adc5e53f9ca77ede553b6061b578569f29fdaccdc51690bad9b718027bf331cd9ab1d6c86ce0e0320786c453c2a136e21cacf59a065772e3209de226c408df750cc695e6fa76d913221b86a7e022e6c2c91ba733c9ff6119c1b22736a5c38cc527a99f65a3c962ca276e9ab4435cb700beda66522137be5e4b1caa5a177d7d135816042940d928bdac6611af9800f65d6ff567a6c85fb0cb4ba2244f58bf35481777f30cb68b2aab286de7ef00091cb7553e605e4669f392a108d1d850706cf87e5b833f1fa660909b5778f88c20a0b68596c35b70de19bdc0139f89817c2de4cb68c3e3ae9fc5d7fe45ae4de0a5119e4e92d86fb8375ccd95217fb4d271b0fe29138a0b6c395946284c538e21a6afc761e7d8c4ba587781f5115d960951d1a960a1d76dac4059fe6563dd6b3caebed649c029700e399d74994869190ee7d75b2df6f703a2b2238394840a9f06ba36e6235da52f8e12ff77e8047d9096fe1364382b94a38932f9447317ff1ef2ff289932588f47a361177c7ff0b92f3d22e2a173d9c3caddf70bba546b5b3297379a2f5b7faa7c8005c9450c98a078d80bd716afb2c38552b5642153e4cf721b73234f91c0c2a40c910d6dcdeecf8e6d05316e6ffe12090e6afd951805c16a6a99ab940e89ce3faf70499fd15fae5800d9b14b68e04677ee699018f4880374b14bb1a8ee5a470d0f12cf24b0430c1c882e58d2c92b315a5dd3229998c2f4698ed7303c544dc969d10c602fd9a98793482b3177e8fdec61f04ad3170e23fa388ba6cca6db26e69cd344109ba9bf5ff163972be7808e883df8d373844766a698f75d906e36e5a89482cb4d4a5a932bda5d43fee4bc089d31d70ce144a348762308ed9d4d51d4e959ca29edc30b9b1a7b1234bcc34b1910fc3883931f0344547bd064050f4e6963ca1240ea3c4846822f4b76ac96f5f156a4e36918eb608340809bcede903256f68d74b3df25e38b2b753598384af92136767d7f6b34dc589312db2405f048d6403330ccc938a1c25fe8d7e7bd03aa02b31f18d83de5f5f2ff4668f7372140c0970ed79f24ebcb18d76c23e693d910d156fd9829bdf792a8321c2594e5be01398987b45165c3a27a9b44e9ebdfae87d77ce91031ad0b87429203c3e8e1b70ebc496d400a08a32a9dbd8ba4b99b980faf0a853c992c1ed147fd409685254a7a68ee4065559108b5b72b790ab84bc971b0e104cddc017596ae115d70fd0b50cc84dd479a4e8ed655f0ee7f74ea870dff3942959a14285326d8f65719c10b068374892f35d6083c676c5d5363a7cf32f6357d067c45d47eb042d588d9826cdfe4ab10e4c7d2d100ffee23e78ebf3306cbc0000cc000100c8001d0000000800010062706600400002001c00040009000001000000000300070403000000ff0300ff0200000014000400ffff0004000200000100ff09000000000c0004000100ff02080000007800060053427c6e022fd3b3e126ec7665279e246bc0997fbcdec61ed64756eff57fe95bbb34c1387ff39dbaa20ba503ae4a0073b2ac2112e0bdb1f1e315978a274e44eb8e6dd927d558d0a50397a1641816224d5d615e9babfc20286da69ee45b89b951ba28202a96a4fa30e0554b10405f6289ec9ffc1c00008c1801008818020000000c000100706f6c6963650000700802000800040081000000080004001f00000004cc6470c67e075159c04c9c58050403000900000002000000020000000700000003000000e30000000300000004000000000100000080000000040000ff0100000000008001000000050000000000008009000000900a00001300000000000000ff030000010001000400000005000000d04d000002000000ff03000002000000010000000200000081000000feffffff070000000900000008000000ffffffff080000000200000000000000050000000400000001000000ed3a0000ab970000070000000200000001010000010000004241000020ab5f5300000100750100000800000000000000ff010000380a0000dd000000040000004d4c00000100000000100000070000000500000002000000002001000600000007000000090000000100000069870000cf0000000500000009000000ffffffff0700000004000000ff03000008000000ffffffff5a120000070000000800000006000000090000000700000016040000000000e0020000000800000075030000ffffff7f080000000100000002000000cf006d3404000000000000000800000008000000070000008100000001feffff01000000000000000200000007000000497c000004000000010000008a210000ff0100000400000003000000240200007f000000000007000000060000000008000062f3ffff1f0000000500000000000000070000007f0000007f0000000600000008000000000000a0010000000800000000100000010100000900000008000000f2000000fe0000000600000000000000000000002d00000064ffffff000400000500000078000000f7ffffff01000000000000006500000006000000692800000008000000000000030000000000010006fffffff9000000070000000700000000000000f8ffffff00000000020000000500000007000000060000000800000001010000fbcf245d0010000008000000db000000ffffffff00000000080000007f00000006000000060000000700000000000000080000000900000006000000010000000180000004000000feffffff00000000ff7f00000800000000020000000800000200000080000000ff011d4635e20000c532fffff9ffffff0100000000010000b1365065243e77887e0000000000044000de05000008000000ff0f0000f8c30000ff0700000008000006000000870000000600000000040000050000000100010007000000020000000100000040000000ff0700000700000068000000070000000400000001000000090000000002000011030000000200000000000002000000260600000500000003000000000100000100000007000000ff03000003000000ff0100002e02000057000000a56b000007000000010400000900000007000000030000000008000001000000f5340000fdffffff060000007f0000000100000080ea4d93f8ffffff04040200ff7f000000000000e0890000070000000000000001000000bb00000000000000030000000000000009000000530000000500000006000000018000000700000047090000abb80000d99f0000010100000500000009000000b7000000ffffffff0100000008000000ff0000000100000008000000030000000180000007000000000000000900000000010000575100000300000000000000d4ffffff0500000000080000cb000000af040000030000000200000000000000010000000400000070050000ffffff7f01000000feffffff01040000030000005692000007000000000200003596000008000000040000000700000000000000ed0b000003000000050000000600000004000000000000000500000001000000bf0d00000100000020000000e1ffffff020000000000000009000000f7ffffff070000000100008008000000fb0e0000ff7f0000040000000200000005000000fdffffff00000000fdffffffffffffff070000000900000003000000cb0e000000000000d858a419018000000600000006000000810000000100000020000000bd000000f7ffffffff010000ee5400004a1e000000000000030000000101000009000000fda6000003000000fcffffff8c050000fdffffff00000000e90000000100000008000000080000000200000002000000010000000000000006000000ffffff7f5a10d92f090000000500000045ed000000040000ffffff7f0200000008000000b800000000100000060000000700000006000000040000000600000002010000010000000000000000000000ff00000000000000feffffff46c700000300000068ae0000070000006d00000019050000ff07000001800000010000000080000009000000e9020000e2cf00000000000000000000ffffff7f02000000fdffffff46690000e10000000900000007000000000000000500000007000000090000000500000016070000010000000000000020000000c7000000ff0f00000200000003000000000100001f000000fa020000010000006667000000f0ffff2b00000000000000fcffffff280000000200000000000000010000006007000001000000d10f000009000000020000001d95714f030000000001000005000000000000000100000003000000010000000300000001000100ff07000049000000b9000000cf000000020000000000000009000000010000000400000002000000090000000200000001000000400000000800000000000000008000000600000000000000030000000300000008000000080000005d05000003000000686e00000004000003000000010000800100000006000000010000000700000003000000040000007602000000000400c3c500007f00000080000000090000003c000100050000000200001004000000f9aa74b76573e8f81c38a780350de86bffffff7f000000000200000700000007000000010105000200000002000000b6000000400000007f000000080004000400000008000400aa000000080004000000000004100600de7e7d0e329b4ef2cf58489950b2c26f2e9a24c7b02891306d64c79c8ae1e17c6706158a9092a4880091d0425cdee88f58aa11acd2be3ce7a7876085e33c56f23de4574f1ae996a6e49d36f33dd2b72282416bc6cc5b83ab9972a06e311ce095e1f30552e553fa23a777c0bd4f6144606e16ef09e8be259cf398c566093539a67975a2d948da639f85e53bdeef8437ff2a12ec97abf6721edbe3566c29282bd306e33ff9e912474f5524d2f48afb9410ff41a3f535d1a5dd3916f4b59d71fadce46776ba9378d602ef0a182e4a6b7bf369e86ccfa375025a1d81eb63e720f614c1f78ebb4c0a3650e74764e21d340c1d9c2497a2d5f1e4c83c11311cbdd20b27cd5f16f0f88b8c4bc13d4d75ed0f788d21420d0fe7bebc01cdb4717ab9a5a1cc92465f0eaba930ae4415c8aa85b3aff9a8e916ffe4ee587e4c95425f740c8ca0dee601e7b44364ad9514ba54398bf2c2379b6e9c3049d8762180e820abdca0c7d11b72bc2e5439df37e91c70bf609f2a1a4f50888b557960378e564a23439c9f82582dfa92f3905379458028744887cf0f76eea3d5887bff3f4494061a006eb3ef510710892a8aa74eb61b9b89da14d21384d7853271785f648974aaf7a20fab55d4ad69794e5bae5e2b6b67218b7004bc22ad1a2a5f45ac193c27417883ee8d1b49cb90fa604a2ae8ec752a3f68b5c41976ad5cca6883093823ccfb6ca1cb25fdfc5b90069bc721d294e77952794063a099d276b3d6906a46eb75fe43e269f847b4402f820618097813c1dfd4add9c496d05b3ee354a16fca6e7aff7f1b55dfd6d1fe1d277d4bf245108930610b276c3be0c77f2b2608bfa3c67fd3ccd844d140b5aaa1387f3ba8ce691939d36e4ccf61f6e222e4bf84a743ff86a652a0dd07312fd9e11a30dd79f108d0b3290cd2f54a9304ffb8cedb38dad9cb6364cb3bc4b467c5088c6c2e5f9d7637d2d8d222f0f45a17d36c0dd52319ef244cb8696ff6c518d7bdd82d941fd72447c40b3c037ec144de96289feb4f472492759d5b32e97a5ffbf6f58dffcb925a1b16c6af82189f08e076866d7f260e3e599e536b3bbca7586f966e11b7d82e0a1856f601b2cb67a0f19062ab790137c74985ea4d5524ca165466ef8ad97f755e1abf6abfd6d3e1b384e3a58461358a6477a800cbc29abb258ca8481aa589b62f5097639f38f2046d73d40e0b468704762d46036c33f5cc51d1c003b772c9fcf03c6ce3456666134ec4915ff480085c40e3d2de743ade15c1048ecc156ec8bc0baa0b5a019985f1472ebdcf73af2a0f336745bfb6adb1db4c7bb9421d7c714c942d04ef568e725f2203f65165e24fdf8696e3ae7999f40c66174627a6ec0d0d355fe4ad57948a4516a06312518dccad2d6e6b07a8db85d6ee3f708ab9f26494c84c07bd242a41606802d17e708c3f0f276135173463726aa7196aa11014cedc29dae279673d4e407fdda208e6711c61a2b50ff905ac07a0150a6bdebd5ad82ca32f6b105a51114777317ec63537f8bb9ca09243584cf11dac437e44efae4922008fb610b58fdb1169815610cb24ddac832abd392ec536ee5ffe7970d52c191cebef7fbf43cfd38f9fc784969322b8b571ef7f4e4d3dad1b547d469777fdf91c1d20b880b838d1af71ffe7e36d843837363a3d26afe16f56f064563b1a66f53b9864c950e722e891a2c3a7df4adc1f37cb68fadd3427cf270ac33b758d0db1b8f9bf6951fb49faeaef89fb06ac4d300c93dcb1848a5fc5b91ff7bb93f0cb7fd57ee19877d99e2619daedf73e65f1cd3d5f2cb1d2f8e8dfa825708f3daccf2ab547f93a073a2557cd817b857777342ebd0176934ce95e0367173cb5cf9d064840a966c14bfc836e4c7eab1f00000000000000ccc64344cb70426e260bc501c953d7b36742c671ecfafd23caecc415bd887b9fe2224c71373480fff068c8a452e8c4d921beebfa2cd7e0ef6025e9d664e06671dacd15689aeae306b70e70139717cf315a3e24201f609f3723cbf9ad885e93c620834353f4f63b19470288f73b6788ce9ddc5fa1e5ddc9c4726181a26a6b68df683683dcee396262c75f5214d81074384b3f439a3b1dec9b2330f5956af19ccc9ede8cda5fbcef7d551174750a3bb69f36b31e10500de8dcc62f431bdbb33cc3a14e248a797295933015bad63e616b641b07606b4801ac1bc2f420fbafb14b2ba8b3a02e32bee4c7a32b648542641ce524eae073a419087a4e075d69b476af146d6a27825a5d8cee35ebfe2da16a49c6d6f1f184a4337314ec97980411f0b40dca9ba538db931368c5db0092f2e7635d184a5f9bb2b6112208d7dae406f49dd3d3276bf39a41e24cce1d7fc203070fd181351f27b0121b62ccec4569ce34b86274b28a163dcba41e7c127942d088ed4ad7d5131f645d78922a132666a3070000000000000045db4334488e9bbe565be79fac05566c8e01e7f95b810bc94a00f387987df1b58f9b33339b2eefb28812554d56165e89d0bbd661c396adac4076f4c5e6948e6640723e18e19538567417061488710d1c1b363c737bf1da0e0aca6641502f2f9353c5e7914f01d1b4a970b57da3fd9b192147e0cd50799492d540ce6aaf4aa62cc310c40e3f0500000057488c47084d9b344b842d9bdccb6b0197fa99cfdad02cc9a402529867c3ba58eaee1404c1fd065d0f98df3c0f2e4ff35df6aa01a96302c9f3c7f1a5de2325af5a5e1ed0abda4019ed1457982a22bfc31fdc98c479ea98f280426e92ed0fbca6e71fa43a2476113bef6f0a402837cb4b27d06c23474b53e45d69faf2b7784e6798b304f3c7ce6e71353c681e1ff27b24c735b5b414a0405094b8f6696e1923987b5a31acb99c5154c7befe2c48b64d454e32d990a90b55c4ea03d9e9bad214350f13d025887a6c3005e4a09a8400a4be537f3c976560467f7dfd9bc58fcaeb824215a685ea6b4d7feee81886e56cc351750f930a7d5c58089f9df241c583d04974778189bf9bb415a0d7f3525aad8f7bf6f896b0d181c031c87b99e7721b2dd765b202fa3a23d2d9e567f672941674058492a2b533f3bbeb24b3c443c252926cd982e18a744d7c0b4442ce4f0f929ad5c3c8c946520537cc07220055c6cb8c0989f6cd8a491d1e0b076cd90797fe0071b3b2bb4a73000a24a3b44a0bd21a1e2fa93f1bccbff90165076541d5d7bd6dec3b6cda70e6620f50bd0359e8e123fa8bf6496ad4dcc4b25cb260a53cd23d4ddbfbf00dbcc3f768f67243d1786f183f3b902508ecb00d68ce561417ff505e90a708000000bb18c04873392d2f354356ffa5f32b42eed1ee486777591dd15914ec76c9ae23769ffae8b32283467697f4d5a6c266aa68062d13df006188ee72c3463d3a5d161825dc2654b9b9888ab022a7820b8108beee9cf66d3cf78ac28025f73da703322ace7697c076b6f84348bfe5bb01369f514d1503cbf1033dd85427d33b43312b31a1118dcf5381a12b4ec5f21d4f0fd193ee39825034bedd2131cc230422c5a85b76e7c30d590540ca5157ea60c8b77c4f795d19bc83f15a3a220e7c255340c42fc2c3f52cf90b1ff9fd6dc84b5a3c854a267bfd64159b840aa0e61a688f0ee4bf74b7329e21f2934b8ee335fb9f2a3233d43257657c83f9af3b64670bfc494f3803f2c6375107cf789ec5295a7f09a6402a8af584db584c22b1681e355ba840e22f2182015de0c736f4f29046a87568c0c8f4c1a6b14fccfdc3dd420780530fb5becb1717b8ea1c5a03a8d3590e60e5918455e10bf4533e892f6e7527bea3e768056e1af4"], 0x1}}, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x1}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 10:21:28 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x15, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x1c}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:21:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256-generic\x00'}, 0x58) socket$alg(0x26, 0x5, 0x0) r1 = accept$alg(r0, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000074c0)='nbd\x00') sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can={0x1d, 0x0, 0x3f00000000000000}, 0x200056d0, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x16f, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 10:21:28 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900840000000a000000000000000000000000000000000000000000000000000000000000000200010000000000000006160000000005000500000000000a00000000000000ff0200000000000000000000000000010000000000000000"], 0x98}}, 0x0) 10:21:28 executing program 1: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="240000001a0025f0001b000400edfc0e1c0b0020e80000001009ffeb0800000310002302", 0x24) 10:21:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="0adc1f123c123f319bc070") r1 = socket$unix(0x1, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x8000000008b0f, &(0x7f0000000080)={'ip6gre0\x00', @ifru_flags=0x1000}) 10:21:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept$inet6(0xffffffffffffff9c, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'security\x00'}, &(0x7f0000000080)=0x54) 10:21:28 executing program 4: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "c22df7", 0xfdb9, 0x2c, 0x0, @dev={0xfe, 0x80, [0x2, 0x0, 0x0, 0x0, 0x6000000, 0x0, 0x7000000, 0x700, 0xe000000, 0x6488, 0xffffff88, 0xf5ffffff00000000]}, @local, {[], @dccp={{0x2c00, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "0087ae", 0x0, "ca8345"}}}}}}}, 0x0) 10:21:28 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900840000000a000000000000000000000000000000000000000000000000000000000000000200010000000000000006160000000005000500000000000a00000000000000ff0200000000000000000000000000010000000000000000"], 0x98}}, 0x0) 10:21:28 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x15, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x1c}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 199.052082][ T9759] IPVS: ftp: loaded support on port[0] = 21 10:21:29 executing program 4: r0 = socket$inet(0x10, 0x3, 0xf) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000200021d8568021baba20400ff7e", 0x24}], 0x1}, 0x0) 10:21:29 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900840000000a000000000000000000000000000000000000000000000000000000000000000200010000000000000006160000000005000500000000000a00000000000000ff0200000000000000000000000000010000000000000000"], 0x98}}, 0x0) 10:21:29 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x15, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x1c}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:21:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000080)=0x8636, 0x4) write$binfmt_misc(r1, &(0x7f0000000040)={'syz1'}, 0x1a000) 10:21:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f00000011c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c}, 0xfca0}}, 0x0) recvmmsg(r2, &(0x7f0000001180)=[{{0x0, 0xeaf4ea4db2787414, &(0x7f0000000000)=[{&(0x7f0000000180)=""/4096, 0x7af}], 0x0, 0x0, 0x1e5}}], 0x400000000000039, 0x0, 0x0) 10:21:29 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x2, 0x0, @multicast2=0xe0000003}}}}}, 0x0) 10:21:29 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x5d}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, 0x48) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x4) sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)={0x14, 0x0, 0xe04}, 0x14}}, 0x0) 10:21:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000080)=0x8636, 0x4) write$binfmt_misc(r1, &(0x7f0000000040)={'syz1'}, 0x1a000) [ 199.803945][ T9759] IPVS: ftp: loaded support on port[0] = 21 10:21:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x4557434d) 10:21:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x5d}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, 0x48) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x4) sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)={0x14, 0x0, 0xe04}, 0x14}}, 0x0) 10:21:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256-generic\x00'}, 0x58) socket$alg(0x26, 0x5, 0x0) r1 = accept$alg(r0, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000074c0)='nbd\x00') sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can={0x1d, 0x0, 0x3f00000000000000}, 0x200056d0, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x16f, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 10:21:30 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000040), 0x8) listen(r0, 0x0) accept(r0, 0x0, 0x0) 10:21:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000080)=0x8636, 0x4) write$binfmt_misc(r1, &(0x7f0000000040)={'syz1'}, 0x1a000) 10:21:30 executing program 4: r0 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000040), 0x4) bind$netlink(r0, &(0x7f0000177ff4), 0xc) 10:21:30 executing program 4: r0 = socket$inet(0x2, 0x3, 0x2) getsockopt(r0, 0x0, 0xcf, 0x0, &(0x7f0000000040)) 10:21:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x5d}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, 0x48) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x4) sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)={0x14, 0x0, 0xe04}, 0x14}}, 0x0) 10:21:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000080)=0x8636, 0x4) write$binfmt_misc(r1, &(0x7f0000000040)={'syz1'}, 0x1a000) 10:21:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="2321202e2f665721babfeb6c65308b02d282c300a1f83dfb"], 0x18) write$binfmt_script(r0, &(0x7f00000001c0)={'#! ', './file0', [], 0xa, "39980cfd42119cc4e10403000300"/25}, 0x24) 10:21:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x5d}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, 0x48) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x4) sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)={0x14, 0x0, 0xe04}, 0x14}}, 0x0) 10:21:30 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000025c0)=0x204, 0x4) bind$inet(r0, &(0x7f0000000140)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='dctcp\x00', 0x6) r1 = socket$inet6(0xa, 0x80002, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) accept4$x25(0xffffffffffffffff, &(0x7f0000000700)={0x9, @remote}, &(0x7f0000000740)=0x12, 0x80000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$SIOCX25GCALLUSERDATA(0xffffffffffffffff, 0x89e4, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x43, 0x0, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x6, 0x61, 0x0, 0x4}]}, &(0x7f0000000000)='Q\xa2\xa2\x11\xbbo-\x95\xd3\xc0I\x960(U\x06\t.\xc3\t\xa4\xd5\x99\x02_2\x01\r\xf8\xedxR\xc2\a\xc0\x17\x15k3\xfc\xe7\x9d\xea\xe7\x19M#\"N\xe4\xe4\xc5\xe3!\xfd\x80\xb7', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r4, r3, 0x3, 0x2}, 0x15) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 10:21:31 executing program 1: unshare(0x60000000) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000fb9fc8)={&(0x7f0000000000), 0xc, &(0x7f0000fe8000)={&(0x7f0000000580)=ANY=[@ANYBLOB="000000000000ffaa000000003c0000001743f55e730236740000000000000000000000000000000000000000000000000000000000000000000000000000000023c7d1de00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000200000000000000000000001c001700000000000000000000000000000000000000001d00"/208], 0x1}}, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0xcf) r1 = socket(0x0, 0x6, 0xac) sendmsg$unix(r1, &(0x7f0000004bc0)={&(0x7f0000003980)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0xc000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfffffc72) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="c31c1000fdeb9f0771"], 0x1}}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x30, &(0x7f0000000100)=[@in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e23, @rand_addr=0x5}, @in={0x2, 0x4e20, @loopback}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000240)={r3, 0x8}, &(0x7f0000000280)=0x8) r4 = socket$inet(0x2, 0x3, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$inet_int(r4, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x3001}, 0xc, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x40) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@local, @in6=@ipv4}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xfe2b) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000340)) sendmsg$nl_netfilter(r1, &(0x7f0000001700)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)={0x20, 0xf, 0x4, 0x0, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0xa}, [@nested={0xc, 0x6e, [@typed={0x8, 0x92, @pid}]}]}, 0x20}}, 0x0) 10:21:31 executing program 0: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x40, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0x8}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000100), 0x1f) 10:21:31 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) listen(r0, 0x0) r1 = socket$inet(0x10, 0x80803, 0x4000000000000004) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f00000001c0)="4c0000001300ff09fffd956fa283b700008c0e02000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b07988100", 0x4c}], 0x1}, 0x0) 10:21:31 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'erg\xc7\x1a\xc9w\xea\xd9\xc3\x00'}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x14, &(0x7f0000000040), 0x50) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) listen(r0, 0x0) accept(r0, 0x0, &(0x7f00000000c0)) 10:21:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256-generic\x00'}, 0x58) socket$alg(0x26, 0x5, 0x0) r1 = accept$alg(r0, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000074c0)='nbd\x00') sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can={0x1d, 0x0, 0x3f00000000000000}, 0x200056d0, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x16f, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 201.396472][ T9868] sock: sock_set_timeout: `syz-executor.3' (pid 9868) tries to set negative timeout 10:21:31 executing program 0: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x40, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0x8}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000100), 0x1f) [ 201.455861][ T9871] sock: sock_set_timeout: `syz-executor.3' (pid 9871) tries to set negative timeout 10:21:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000640)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r2}, {r0}], 0x2, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) [ 201.541672][ T9874] IPVS: ftp: loaded support on port[0] = 21 10:21:31 executing program 4: unshare(0x6c060000) r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000100)={{0x3, @default}, [@bcast, @null, @null, @null, @null, @bcast, @null, @netrom]}, &(0x7f0000000180)=0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ppp0securitybdev}.&-md5sum\x00', 0xffffffffffffff9c}, 0x10) socket$caif_stream(0x25, 0x1, 0x4) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000340)=ANY=[@ANYBLOB]) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x7fff, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0xf]}, 0x2c) socket$inet6(0xa, 0x80007, 0x5) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000003040)='pids.current\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000030c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000003280)={&(0x7f0000003080), 0xc, 0x0}, 0x0) getsockname$inet6(0xffffffffffffffff, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 10:21:31 executing program 0: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x40, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0x8}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000100), 0x1f) 10:21:31 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) listen(r0, 0x0) r1 = socket$inet(0x10, 0x80803, 0x4000000000000004) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f00000001c0)="4c0000001300ff09fffd956fa283b700008c0e02000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b07988100", 0x4c}], 0x1}, 0x0) [ 201.803492][ T9886] IPVS: ftp: loaded support on port[0] = 21 10:21:31 executing program 0: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x40, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0x8}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000100), 0x1f) 10:21:31 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x1}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa08020000000000008f976c260105000600200000000a00000000000000000500e50000070000001f000000000000250000000000000200010000000000000000020000627c05000500000000000a00000000000000ff17000000000000000000000000011700010000fdffffff"], 0x80}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="020a0000020000000000e94f99c654a4a9"], 0x11}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) [ 202.335288][ T9887] IPVS: ftp: loaded support on port[0] = 21 10:21:32 executing program 1: unshare(0x60000000) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000fb9fc8)={&(0x7f0000000000), 0xc, &(0x7f0000fe8000)={&(0x7f0000000580)=ANY=[@ANYBLOB="000000000000ffaa000000003c0000001743f55e730236740000000000000000000000000000000000000000000000000000000000000000000000000000000023c7d1de00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000200000000000000000000001c001700000000000000000000000000000000000000001d00"/208], 0x1}}, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0xcf) r1 = socket(0x0, 0x6, 0xac) sendmsg$unix(r1, &(0x7f0000004bc0)={&(0x7f0000003980)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0xc000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfffffc72) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="c31c1000fdeb9f0771"], 0x1}}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x30, &(0x7f0000000100)=[@in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e23, @rand_addr=0x5}, @in={0x2, 0x4e20, @loopback}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000240)={r3, 0x8}, &(0x7f0000000280)=0x8) r4 = socket$inet(0x2, 0x3, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$inet_int(r4, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x3001}, 0xc, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x40) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@local, @in6=@ipv4}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xfe2b) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000340)) sendmsg$nl_netfilter(r1, &(0x7f0000001700)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)={0x20, 0xf, 0x4, 0x0, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0xa}, [@nested={0xc, 0x6e, [@typed={0x8, 0x92, @pid}]}]}, 0x20}}, 0x0) 10:21:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000100)=""/44, 0x2c}], 0x1}}], 0x1, 0x0, 0x0) 10:21:32 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) listen(r0, 0x0) r1 = socket$inet(0x10, 0x80803, 0x4000000000000004) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f00000001c0)="4c0000001300ff09fffd956fa283b700008c0e02000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b07988100", 0x4c}], 0x1}, 0x0) 10:21:32 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000040), 0xfffffffffffffeb4) 10:21:32 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x73) sendmmsg(r0, &(0x7f0000002700)=[{{&(0x7f0000000140)=@nl=@unspec, 0x14a, 0x0}}, {{&(0x7f0000001a80)=@in={0x2, 0x0, @broadcast}, 0x5, 0x0}}], 0x2, 0x0) 10:21:32 executing program 4: unshare(0x6c060000) r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000100)={{0x3, @default}, [@bcast, @null, @null, @null, @null, @bcast, @null, @netrom]}, &(0x7f0000000180)=0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ppp0securitybdev}.&-md5sum\x00', 0xffffffffffffff9c}, 0x10) socket$caif_stream(0x25, 0x1, 0x4) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000340)=ANY=[@ANYBLOB]) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x7fff, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0xf]}, 0x2c) socket$inet6(0xa, 0x80007, 0x5) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000003040)='pids.current\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000030c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000003280)={&(0x7f0000003080), 0xc, 0x0}, 0x0) getsockname$inet6(0xffffffffffffffff, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) [ 202.775214][ T9927] IPVS: ftp: loaded support on port[0] = 21 10:21:32 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000040), 0xfffffffffffffeb4) 10:21:32 executing program 3: unshare(0x60000000) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000fb9fc8)={&(0x7f0000000000), 0xc, &(0x7f0000fe8000)={&(0x7f0000000580)=ANY=[@ANYBLOB="000000000000ffaa000000003c0000001743f55e730236740000000000000000000000000000000000000000000000000000000000000000000000000000000023c7d1de00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000200000000000000000000001c001700000000000000000000000000000000000000001d00"/208], 0x1}}, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0xcf) r1 = socket(0x0, 0x6, 0xac) sendmsg$unix(r1, &(0x7f0000004bc0)={&(0x7f0000003980)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0xc000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfffffc72) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="c31c1000fdeb9f0771"], 0x1}}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x30, &(0x7f0000000100)=[@in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e23, @rand_addr=0x5}, @in={0x2, 0x4e20, @loopback}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000240)={r3, 0x8}, &(0x7f0000000280)=0x8) r4 = socket$inet(0x2, 0x3, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$inet_int(r4, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x3001}, 0xc, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x40) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@local, @in6=@ipv4}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xfe2b) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000340)) sendmsg$nl_netfilter(r1, &(0x7f0000001700)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)={0x20, 0xf, 0x4, 0x0, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0xa}, [@nested={0xc, 0x6e, [@typed={0x8, 0x92, @pid}]}]}, 0x20}}, 0x0) 10:21:32 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) listen(r0, 0x0) r1 = socket$inet(0x10, 0x80803, 0x4000000000000004) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f00000001c0)="4c0000001300ff09fffd956fa283b700008c0e02000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b07988100", 0x4c}], 0x1}, 0x0) [ 202.947545][ T9939] IPVS: ftp: loaded support on port[0] = 21 10:21:33 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000040)=0xffff, 0x4) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) writev(r0, &(0x7f0000001380)=[{&(0x7f0000001100)="d2", 0x1}], 0x1) recvmmsg(r0, &(0x7f0000001c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=""/91, 0x5b}}], 0x1, 0x0, 0x0) 10:21:33 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000040), 0xfffffffffffffeb4) [ 203.222550][ T9956] IPVS: ftp: loaded support on port[0] = 21 10:21:33 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000040), 0xfffffffffffffeb4) 10:21:33 executing program 1: unshare(0x60000000) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000fb9fc8)={&(0x7f0000000000), 0xc, &(0x7f0000fe8000)={&(0x7f0000000580)=ANY=[@ANYBLOB="000000000000ffaa000000003c0000001743f55e730236740000000000000000000000000000000000000000000000000000000000000000000000000000000023c7d1de00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000200000000000000000000001c001700000000000000000000000000000000000000001d00"/208], 0x1}}, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0xcf) r1 = socket(0x0, 0x6, 0xac) sendmsg$unix(r1, &(0x7f0000004bc0)={&(0x7f0000003980)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0xc000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfffffc72) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="c31c1000fdeb9f0771"], 0x1}}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x30, &(0x7f0000000100)=[@in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e23, @rand_addr=0x5}, @in={0x2, 0x4e20, @loopback}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000240)={r3, 0x8}, &(0x7f0000000280)=0x8) r4 = socket$inet(0x2, 0x3, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$inet_int(r4, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x3001}, 0xc, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x40) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@local, @in6=@ipv4}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xfe2b) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000340)) sendmsg$nl_netfilter(r1, &(0x7f0000001700)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)={0x20, 0xf, 0x4, 0x0, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0xa}, [@nested={0xc, 0x6e, [@typed={0x8, 0x92, @pid}]}]}, 0x20}}, 0x0) 10:21:33 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x20, 0x19, 0x201, 0x0, 0x0, {0x1d, 0xd601}, [@nested={0xc, 0xb, [@typed={0x8, 0x0, @ipv4=@remote}]}]}, 0x20}}, 0x0) 10:21:33 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000040)=0xffff, 0x4) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) writev(r0, &(0x7f0000001380)=[{&(0x7f0000001100)="d2", 0x1}], 0x1) recvmmsg(r0, &(0x7f0000001c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=""/91, 0x5b}}], 0x1, 0x0, 0x0) 10:21:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$cgroup_ro(0xffffffffffffffff, 0x0, 0xe7e000, 0x0) 10:21:33 executing program 4: unshare(0x6c060000) r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000100)={{0x3, @default}, [@bcast, @null, @null, @null, @null, @bcast, @null, @netrom]}, &(0x7f0000000180)=0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ppp0securitybdev}.&-md5sum\x00', 0xffffffffffffff9c}, 0x10) socket$caif_stream(0x25, 0x1, 0x4) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000340)=ANY=[@ANYBLOB]) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x7fff, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0xf]}, 0x2c) socket$inet6(0xa, 0x80007, 0x5) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000003040)='pids.current\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000030c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000003280)={&(0x7f0000003080), 0xc, 0x0}, 0x0) getsockname$inet6(0xffffffffffffffff, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 10:21:33 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) sendmmsg(r0, &(0x7f0000e8e000)=[{{&(0x7f00008b6000)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8d], 0xffffffffffffffff}, 0x1}, 0x80, &(0x7f0000231ff0)=[{&(0x7f0000f89000)='t', 0x1}], 0x1}}], 0x1, 0x0) listen(r0, 0x400000000007) accept(r0, &(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) 10:21:33 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000040)=0xffff, 0x4) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) writev(r0, &(0x7f0000001380)=[{&(0x7f0000001100)="d2", 0x1}], 0x1) recvmmsg(r0, &(0x7f0000001c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=""/91, 0x5b}}], 0x1, 0x0, 0x0) [ 203.852393][ T9985] IPVS: ftp: loaded support on port[0] = 21 [ 203.917578][ T9989] IPVS: ftp: loaded support on port[0] = 21 10:21:34 executing program 3: unshare(0x60000000) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000fb9fc8)={&(0x7f0000000000), 0xc, &(0x7f0000fe8000)={&(0x7f0000000580)=ANY=[@ANYBLOB="000000000000ffaa000000003c0000001743f55e730236740000000000000000000000000000000000000000000000000000000000000000000000000000000023c7d1de00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000200000000000000000000001c001700000000000000000000000000000000000000001d00"/208], 0x1}}, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0xcf) r1 = socket(0x0, 0x6, 0xac) sendmsg$unix(r1, &(0x7f0000004bc0)={&(0x7f0000003980)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0xc000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfffffc72) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="c31c1000fdeb9f0771"], 0x1}}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x30, &(0x7f0000000100)=[@in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e23, @rand_addr=0x5}, @in={0x2, 0x4e20, @loopback}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000240)={r3, 0x8}, &(0x7f0000000280)=0x8) r4 = socket$inet(0x2, 0x3, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$inet_int(r4, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x3001}, 0xc, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x40) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@local, @in6=@ipv4}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xfe2b) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000340)) sendmsg$nl_netfilter(r1, &(0x7f0000001700)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)={0x20, 0xf, 0x4, 0x0, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0xa}, [@nested={0xc, 0x6e, [@typed={0x8, 0x92, @pid}]}]}, 0x20}}, 0x0) 10:21:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000200)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000240)=0x18) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000480)={r3, 0x80, 0x10, 0x0, 0x1062}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008914, &(0x7f0000000140)="0adc1f023c12") r5 = socket$vsock_dgram(0x28, 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) syz_genetlink_get_family_id$ipvs(0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r6, 0x111, 0x4, 0x0, 0x4) socket$inet6(0xa, 0x80001, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') ioctl$FIGETBSZ(r5, 0x2, &(0x7f00000000c0)) ioctl(0xffffffffffffffff, 0x8912, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r6, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000004}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x4004800) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000500), &(0x7f0000000540)=0x4) syz_emit_ethernet(0x3e, &(0x7f0000000040)={@broadcast, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x3, 0x5, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4004, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) unshare(0x40000000) r7 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r7, 0x84, 0x2, &(0x7f0000000080)={0x0, 0x10ab, 0x7, 0xfffffffffffffd92}, 0x8) r8 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r8, 0x89f1, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000040)=@ethtool_test}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) poll(&(0x7f0000000040)=[{}], 0x20000000000000e6, 0x0) 10:21:34 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000040)=0xffff, 0x4) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) writev(r0, &(0x7f0000001380)=[{&(0x7f0000001100)="d2", 0x1}], 0x1) recvmmsg(r0, &(0x7f0000001c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=""/91, 0x5b}}], 0x1, 0x0, 0x0) 10:21:34 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) sendmmsg(r0, &(0x7f0000e8e000)=[{{&(0x7f00008b6000)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8d], 0xffffffffffffffff}, 0x1}, 0x80, &(0x7f0000231ff0)=[{&(0x7f0000f89000)='t', 0x1}], 0x1}}], 0x1, 0x0) listen(r0, 0x400000000007) accept(r0, &(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) 10:21:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e0000002c008151e00f80ecdb4cb904014865160b00014103000000000a00180e0006001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0) socket$key(0xf, 0x3, 0x2) socket(0x13, 0x7, 0x15) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f00000014c0), 0x4) [ 204.491644][T10023] IPVS: ftp: loaded support on port[0] = 21 [ 204.524298][T10024] IPVS: ftp: loaded support on port[0] = 21 [ 204.901219][T10023] IPVS: ftp: loaded support on port[0] = 21 10:21:34 executing program 1: unshare(0x60000000) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000fb9fc8)={&(0x7f0000000000), 0xc, &(0x7f0000fe8000)={&(0x7f0000000580)=ANY=[@ANYBLOB="000000000000ffaa000000003c0000001743f55e730236740000000000000000000000000000000000000000000000000000000000000000000000000000000023c7d1de00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000200000000000000000000001c001700000000000000000000000000000000000000001d00"/208], 0x1}}, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0xcf) r1 = socket(0x0, 0x6, 0xac) sendmsg$unix(r1, &(0x7f0000004bc0)={&(0x7f0000003980)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0xc000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfffffc72) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="c31c1000fdeb9f0771"], 0x1}}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x30, &(0x7f0000000100)=[@in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e23, @rand_addr=0x5}, @in={0x2, 0x4e20, @loopback}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000240)={r3, 0x8}, &(0x7f0000000280)=0x8) r4 = socket$inet(0x2, 0x3, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$inet_int(r4, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x3001}, 0xc, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x40) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@local, @in6=@ipv4}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xfe2b) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000340)) sendmsg$nl_netfilter(r1, &(0x7f0000001700)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)={0x20, 0xf, 0x4, 0x0, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0xa}, [@nested={0xc, 0x6e, [@typed={0x8, 0x92, @pid}]}]}, 0x20}}, 0x0) 10:21:34 executing program 4: unshare(0x6c060000) r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000100)={{0x3, @default}, [@bcast, @null, @null, @null, @null, @bcast, @null, @netrom]}, &(0x7f0000000180)=0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ppp0securitybdev}.&-md5sum\x00', 0xffffffffffffff9c}, 0x10) socket$caif_stream(0x25, 0x1, 0x4) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000340)=ANY=[@ANYBLOB]) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x7fff, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0xf]}, 0x2c) socket$inet6(0xa, 0x80007, 0x5) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000003040)='pids.current\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000030c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000003280)={&(0x7f0000003080), 0xc, 0x0}, 0x0) getsockname$inet6(0xffffffffffffffff, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 10:21:34 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) setsockopt(r0, 0x0, 0x0, &(0x7f0000000000), 0x0) 10:21:35 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f0000001000/0x2000)=nil, 0x7fffdfffe000, 0x0, 0x32, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000180), 0x12) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.events\x00', 0x275a, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r2, 0x10f, 0x84, &(0x7f0000000040), 0x0) write$cgroup_int(r2, &(0x7f0000000100), 0xffffffd5) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r2, 0x40}) [ 205.025819][T10050] IPVS: ftp: loaded support on port[0] = 21 10:21:35 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) sendmmsg(r0, &(0x7f0000e8e000)=[{{&(0x7f00008b6000)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8d], 0xffffffffffffffff}, 0x1}, 0x80, &(0x7f0000231ff0)=[{&(0x7f0000f89000)='t', 0x1}], 0x1}}], 0x1, 0x0) listen(r0, 0x400000000007) accept(r0, &(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) [ 205.267163][T10062] IPVS: ftp: loaded support on port[0] = 21 10:21:35 executing program 3: unshare(0x60000000) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000fb9fc8)={&(0x7f0000000000), 0xc, &(0x7f0000fe8000)={&(0x7f0000000580)=ANY=[@ANYBLOB="000000000000ffaa000000003c0000001743f55e730236740000000000000000000000000000000000000000000000000000000000000000000000000000000023c7d1de00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000200000000000000000000001c001700000000000000000000000000000000000000001d00"/208], 0x1}}, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0xcf) r1 = socket(0x0, 0x6, 0xac) sendmsg$unix(r1, &(0x7f0000004bc0)={&(0x7f0000003980)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0xc000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfffffc72) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="c31c1000fdeb9f0771"], 0x1}}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x30, &(0x7f0000000100)=[@in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e23, @rand_addr=0x5}, @in={0x2, 0x4e20, @loopback}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000240)={r3, 0x8}, &(0x7f0000000280)=0x8) r4 = socket$inet(0x2, 0x3, 0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$inet_int(r4, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x3001}, 0xc, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x40) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@local, @in6=@ipv4}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xfe2b) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000340)) sendmsg$nl_netfilter(r1, &(0x7f0000001700)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)={0x20, 0xf, 0x4, 0x0, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0xa}, [@nested={0xc, 0x6e, [@typed={0x8, 0x92, @pid}]}]}, 0x20}}, 0x0) 10:21:35 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) sendmmsg(r0, &(0x7f0000e8e000)=[{{&(0x7f00008b6000)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8d], 0xffffffffffffffff}, 0x1}, 0x80, &(0x7f0000231ff0)=[{&(0x7f0000f89000)='t', 0x1}], 0x1}}], 0x1, 0x0) listen(r0, 0x400000000007) accept(r0, &(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) [ 205.704575][T10075] IPVS: ftp: loaded support on port[0] = 21 10:21:35 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000040)=@short={0xb, @dev, @rose, 0x1, @default}, 0x1c) getsockname(r0, 0x0, &(0x7f0000000000)) 10:21:37 executing program 0: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x17f) write(r0, &(0x7f0000000580)="1b0000001e001f0214f9f4ff08000000070d000000000000000000", 0x1b) 10:21:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000200)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000240)=0x18) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000480)={r3, 0x80, 0x10, 0x0, 0x1062}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008914, &(0x7f0000000140)="0adc1f023c12") r5 = socket$vsock_dgram(0x28, 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) syz_genetlink_get_family_id$ipvs(0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r6, 0x111, 0x4, 0x0, 0x4) socket$inet6(0xa, 0x80001, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') ioctl$FIGETBSZ(r5, 0x2, &(0x7f00000000c0)) ioctl(0xffffffffffffffff, 0x8912, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r6, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000004}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x4004800) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000500), &(0x7f0000000540)=0x4) syz_emit_ethernet(0x3e, &(0x7f0000000040)={@broadcast, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x3, 0x5, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4004, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) unshare(0x40000000) r7 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r7, 0x84, 0x2, &(0x7f0000000080)={0x0, 0x10ab, 0x7, 0xfffffffffffffd92}, 0x8) r8 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r8, 0x89f1, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000040)=@ethtool_test}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) poll(&(0x7f0000000040)=[{}], 0x20000000000000e6, 0x0) 10:21:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) close(r1) 10:21:37 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$sock_buf(r0, 0x1, 0x3d, &(0x7f0000000040)=""/119, &(0x7f00000000c0)=0x77) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, &(0x7f00000006c0)=[{0x0, 0x2000000}], 0x1}}], 0x48}, 0x0) 10:21:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000240)='bridge_slave_1\x00', 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000080)=0x32, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_ifreq(r1, 0x8937, &(0x7f0000000100)={'veth0\x00', @ifru_settings={0x10001, 0x0, @fr=0x0}}) setsockopt$inet_mtu(r1, 0x0, 0x8, 0x0, 0x0) 10:21:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst={0x7, 0x3, 0x0, 0xa0c91}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) [ 207.984694][T10097] IPVS: ftp: loaded support on port[0] = 21 10:21:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) close(r1) 10:21:38 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="80"], 0x1) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x6}) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 10:21:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000200)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000240)=0x18) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000480)={r3, 0x80, 0x10, 0x0, 0x1062}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008914, &(0x7f0000000140)="0adc1f023c12") r5 = socket$vsock_dgram(0x28, 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) syz_genetlink_get_family_id$ipvs(0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r6, 0x111, 0x4, 0x0, 0x4) socket$inet6(0xa, 0x80001, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') ioctl$FIGETBSZ(r5, 0x2, &(0x7f00000000c0)) ioctl(0xffffffffffffffff, 0x8912, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r6, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000004}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x4004800) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000500), &(0x7f0000000540)=0x4) syz_emit_ethernet(0x3e, &(0x7f0000000040)={@broadcast, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x3, 0x5, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4004, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) unshare(0x40000000) r7 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r7, 0x84, 0x2, &(0x7f0000000080)={0x0, 0x10ab, 0x7, 0xfffffffffffffd92}, 0x8) r8 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r8, 0x89f1, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000040)=@ethtool_test}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) poll(&(0x7f0000000040)=[{}], 0x20000000000000e6, 0x0) 10:21:39 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0xff, 0x1}, 0x20) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xe}, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @loopback}, 0x1c) [ 210.451836][T10134] IPVS: ftp: loaded support on port[0] = 21 [ 210.454166][T10137] IPVS: ftp: loaded support on port[0] = 21 [ 210.596711][T10137] chnl_net:caif_netlink_parms(): no params data found [ 210.796535][T10134] chnl_net:caif_netlink_parms(): no params data found [ 210.818624][T10137] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.827883][T10137] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.836499][T10137] device bridge_slave_0 entered promiscuous mode [ 210.844918][T10137] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.852205][T10137] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.860400][T10137] device bridge_slave_1 entered promiscuous mode [ 210.976956][T10137] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 210.991687][T10134] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.998824][T10134] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.007297][T10134] device bridge_slave_0 entered promiscuous mode [ 211.017099][T10137] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 211.105324][T10134] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.112711][T10134] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.120994][T10134] device bridge_slave_1 entered promiscuous mode [ 211.157472][T10137] team0: Port device team_slave_0 added [ 211.240113][T10134] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 211.250870][T10137] team0: Port device team_slave_1 added [ 211.258466][T10134] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 211.293872][T10134] team0: Port device team_slave_0 added [ 211.301323][T10134] team0: Port device team_slave_1 added [ 211.342935][T10137] device hsr_slave_0 entered promiscuous mode [ 211.380076][T10137] device hsr_slave_1 entered promiscuous mode [ 211.542824][T10134] device hsr_slave_0 entered promiscuous mode [ 211.600097][T10134] device hsr_slave_1 entered promiscuous mode [ 211.899701][T10137] 8021q: adding VLAN 0 to HW filter on device bond0 [ 211.989934][T10137] 8021q: adding VLAN 0 to HW filter on device team0 [ 211.996894][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 212.004805][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.017208][T10134] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.111228][ T3064] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 212.120132][ T3064] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 212.128396][ T3064] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.135499][ T3064] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.143633][ T3064] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 212.153626][ T3064] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 212.162082][ T3064] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.169109][ T3064] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.177034][ T3064] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 212.184706][ T3064] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.192947][ T3064] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 212.201865][ T3064] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 212.217693][T10134] 8021q: adding VLAN 0 to HW filter on device team0 [ 212.233464][ T8880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 212.242352][ T8880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 212.251971][ T8880] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.259025][ T8880] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.266938][ T8880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 212.276002][ T8880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 212.292141][ T9492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 212.300819][ T9492] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 212.309092][ T9492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 212.318286][ T9492] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 212.327425][ T9492] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.334545][ T9492] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.342414][ T9492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 212.351474][ T9492] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 212.360573][ T9492] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 212.375756][ T32] device bridge_slave_1 left promiscuous mode [ 212.383784][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.434103][ T32] device bridge_slave_0 left promiscuous mode [ 212.440716][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.193348][ T32] device hsr_slave_1 left promiscuous mode [ 214.253596][ T32] device hsr_slave_0 left promiscuous mode [ 214.307259][ T32] team0 (unregistering): Port device team_slave_1 removed [ 214.319494][ T32] team0 (unregistering): Port device team_slave_0 removed [ 214.332928][ T32] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 214.374965][ T32] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 214.469273][ T32] bond0 (unregistering): Released all slaves [ 214.579790][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 214.595468][T10137] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 214.606089][T10137] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 214.620562][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 214.629087][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 214.637931][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 214.647729][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 214.656773][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 214.676979][ T8876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 214.697885][ T9492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 214.706827][ T9492] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 214.721468][T10137] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 214.744060][ T8876] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 214.765757][ T8876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 214.776013][ T8876] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 214.791273][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 214.800403][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 214.808776][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 214.817817][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 214.828961][T10134] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 215.013852][T10134] 8021q: adding VLAN 0 to HW filter on device batadv0 10:21:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000200)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000240)=0x18) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000480)={r3, 0x80, 0x10, 0x0, 0x1062}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008914, &(0x7f0000000140)="0adc1f023c12") r5 = socket$vsock_dgram(0x28, 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) syz_genetlink_get_family_id$ipvs(0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r6, 0x111, 0x4, 0x0, 0x4) socket$inet6(0xa, 0x80001, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') ioctl$FIGETBSZ(r5, 0x2, &(0x7f00000000c0)) ioctl(0xffffffffffffffff, 0x8912, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r6, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000004}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x4004800) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000500), &(0x7f0000000540)=0x4) syz_emit_ethernet(0x3e, &(0x7f0000000040)={@broadcast, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x3, 0x5, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4004, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) unshare(0x40000000) r7 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r7, 0x84, 0x2, &(0x7f0000000080)={0x0, 0x10ab, 0x7, 0xfffffffffffffd92}, 0x8) r8 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r8, 0x89f1, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000040)=@ethtool_test}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) poll(&(0x7f0000000040)=[{}], 0x20000000000000e6, 0x0) 10:21:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) sendto$inet6(r0, 0x0, 0x16, 0x20000000, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 10:21:45 executing program 3: r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0, 0xfc5f}], 0x1}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) 10:21:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000480)="2f0000001c0005c5ffffff000d000000020000000b000000ec0002c913000180f0ffffebffff6e263f", 0x29}], 0x1}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x4, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) 10:21:45 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 10:21:45 executing program 3: r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0, 0xfc5f}], 0x1}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) 10:21:45 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 10:21:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000100)=[{0x400000004d}, {0x80000006}]}, 0x10) [ 216.489746][ C1] ================================================================== [ 216.497946][ C1] BUG: KASAN: use-after-free in inet_frag_destroy_rcu+0xd9/0xe0 [ 216.505574][ C1] Read of size 8 at addr ffff88806ed47a18 by task swapper/1/0 [ 216.513014][ C1] [ 216.515328][ C1] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 5.2.0-rc1+ #2 [ 216.522478][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.532523][ C1] Call Trace: [ 216.535786][ C1] [ 216.538625][ C1] dump_stack+0x172/0x1f0 [ 216.542941][ C1] ? inet_frag_destroy_rcu+0xd9/0xe0 [ 216.548215][ C1] print_address_description.cold+0x7c/0x20d [ 216.554185][ C1] ? inet_frag_destroy_rcu+0xd9/0xe0 [ 216.559457][ C1] ? inet_frag_destroy_rcu+0xd9/0xe0 [ 216.564751][ C1] __kasan_report.cold+0x1b/0x40 [ 216.569678][ C1] ? inet_frag_destroy_rcu+0xd9/0xe0 [ 216.574950][ C1] ? inet_frags_free_cb+0x120/0x120 [ 216.580136][ C1] kasan_report+0x12/0x20 [ 216.584474][ C1] __asan_report_load8_noabort+0x14/0x20 [ 216.590181][ C1] inet_frag_destroy_rcu+0xd9/0xe0 [ 216.595280][ C1] rcu_core+0xba5/0x1500 [ 216.599514][ C1] ? rcu_note_context_switch+0x1910/0x1910 [ 216.605317][ C1] __do_softirq+0x25c/0x94c [ 216.609804][ C1] ? sched_clock_cpu+0x1b/0x1b0 [ 216.614637][ C1] irq_exit+0x180/0x1d0 [ 216.618773][ C1] smp_apic_timer_interrupt+0x13b/0x550 [ 216.624324][ C1] apic_timer_interrupt+0xf/0x20 [ 216.629236][ C1] [ 216.632159][ C1] RIP: 0010:native_safe_halt+0xe/0x10 [ 216.637511][ C1] Code: ff ff 48 89 df e8 f2 95 8c fa eb 82 e9 07 00 00 00 0f 00 2d e4 45 4b 00 f4 c3 66 90 e9 07 00 00 00 0f 00 2d d4 45 4b 00 fb f4 90 55 48 89 e5 41 57 41 56 41 55 41 54 53 e8 8e 18 42 fa e8 99 [ 216.657102][ C1] RSP: 0018:ffff8880a98e7d78 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 [ 216.665501][ C1] RAX: 1ffffffff1164e11 RBX: ffff8880a98d4340 RCX: 0000000000000000 [ 216.673471][ C1] RDX: dffffc0000000000 RSI: 0000000000000006 RDI: ffff8880a98d4bbc [ 216.681441][ C1] RBP: ffff8880a98e7da8 R08: ffff8880a98d4340 R09: 0000000000000000 [ 216.689399][ C1] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001 [ 216.697371][ C1] R13: ffffffff88b27078 R14: 0000000000000001 R15: 0000000000000000 [ 216.705347][ C1] ? default_idle+0x4e/0x320 [ 216.709923][ C1] arch_cpu_idle+0xa/0x10 [ 216.714234][ C1] default_idle_call+0x36/0x90 [ 216.718978][ C1] do_idle+0x377/0x560 [ 216.723242][ C1] ? arch_cpu_idle_exit+0x80/0x80 [ 216.728247][ C1] cpu_startup_entry+0x1b/0x20 [ 216.732990][ C1] start_secondary+0x34e/0x4c0 [ 216.737734][ C1] ? set_cpu_sibling_map+0x1860/0x1860 [ 216.743179][ C1] secondary_startup_64+0xa4/0xb0 [ 216.748185][ C1] [ 216.750493][ C1] Allocated by task 8877: [ 216.754803][ C1] save_stack+0x23/0x90 [ 216.758941][ C1] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 216.764554][ C1] kasan_kmalloc+0x9/0x10 [ 216.768856][ C1] kmem_cache_alloc_trace+0x151/0x750 [ 216.774204][ C1] ipv6_frags_init_net+0x48/0x460 [ 216.779203][ C1] ops_init+0xb3/0x410 [ 216.783247][ C1] setup_net+0x2d3/0x740 [ 216.787465][ C1] copy_net_ns+0x1df/0x340 [ 216.791859][ C1] create_new_namespaces+0x400/0x7b0 [ 216.797123][ C1] unshare_nsproxy_namespaces+0xc2/0x200 [ 216.802735][ C1] ksys_unshare+0x440/0x980 [ 216.807215][ C1] __x64_sys_unshare+0x31/0x40 [ 216.811978][ C1] do_syscall_64+0xfd/0x680 [ 216.816468][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 216.822332][ C1] [ 216.824650][ C1] Freed by task 17: [ 216.828436][ C1] save_stack+0x23/0x90 [ 216.832595][ C1] __kasan_slab_free+0x102/0x150 [ 216.837511][ C1] kasan_slab_free+0xe/0x10 [ 216.841997][ C1] kfree+0xcf/0x220 [ 216.845867][ C1] fqdir_rwork_fn+0x33/0x40 [ 216.850346][ C1] process_one_work+0x989/0x1790 [ 216.855280][ C1] worker_thread+0x98/0xe40 [ 216.859761][ C1] kthread+0x354/0x420 [ 216.863812][ C1] ret_from_fork+0x24/0x30 [ 216.868200][ C1] [ 216.870508][ C1] The buggy address belongs to the object at ffff88806ed47a00 [ 216.870508][ C1] which belongs to the cache kmalloc-512 of size 512 [ 216.885334][ C1] The buggy address is located 24 bytes inside of [ 216.885334][ C1] 512-byte region [ffff88806ed47a00, ffff88806ed47c00) [ 216.898505][ C1] The buggy address belongs to the page: [ 216.904122][ C1] page:ffffea0001bb51c0 refcount:1 mapcount:0 mapping:ffff8880aa400940 index:0x0 [ 216.913204][ C1] flags: 0x1fffc0000000200(slab) [ 216.918119][ C1] raw: 01fffc0000000200 ffffea000282a788 ffffea0001bb53c8 ffff8880aa400940 [ 216.926699][ C1] raw: 0000000000000000 ffff88806ed47000 0000000100000006 0000000000000000 [ 216.935258][ C1] page dumped because: kasan: bad access detected [ 216.941645][ C1] [ 216.943948][ C1] Memory state around the buggy address: [ 216.949590][ C1] ffff88806ed47900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 216.957634][ C1] ffff88806ed47980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 216.965675][ C1] >ffff88806ed47a00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 216.973712][ C1] ^ [ 216.978561][ C1] ffff88806ed47a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 216.986612][ C1] ffff88806ed47b00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 216.994648][ C1] ================================================================== [ 217.002707][ C1] Disabling lock debugging due to kernel taint [ 217.008880][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 217.015477][ C1] CPU: 1 PID: 0 Comm: swapper/1 Tainted: G B 5.2.0-rc1+ #2 [ 217.023961][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 217.033995][ C1] Call Trace: [ 217.037253][ C1] [ 217.040088][ C1] dump_stack+0x172/0x1f0 [ 217.044397][ C1] panic+0x2cb/0x744 [ 217.048267][ C1] ? __warn_printk+0xf3/0xf3 [ 217.052836][ C1] ? trace_hardirqs_on+0x5e/0x220 [ 217.057838][ C1] ? trace_hardirqs_on+0x5e/0x220 [ 217.062841][ C1] ? inet_frag_destroy_rcu+0xd9/0xe0 [ 217.068107][ C1] end_report+0x47/0x4f [ 217.072258][ C1] ? inet_frag_destroy_rcu+0xd9/0xe0 [ 217.077520][ C1] __kasan_report.cold+0xe/0x40 [ 217.082380][ C1] ? inet_frag_destroy_rcu+0xd9/0xe0 [ 217.087658][ C1] ? inet_frags_free_cb+0x120/0x120 [ 217.092844][ C1] kasan_report+0x12/0x20 [ 217.097152][ C1] __asan_report_load8_noabort+0x14/0x20 [ 217.102764][ C1] inet_frag_destroy_rcu+0xd9/0xe0 [ 217.107851][ C1] rcu_core+0xba5/0x1500 [ 217.112075][ C1] ? rcu_note_context_switch+0x1910/0x1910 [ 217.117879][ C1] __do_softirq+0x25c/0x94c [ 217.122360][ C1] ? sched_clock_cpu+0x1b/0x1b0 [ 217.127195][ C1] irq_exit+0x180/0x1d0 [ 217.131333][ C1] smp_apic_timer_interrupt+0x13b/0x550 [ 217.136858][ C1] apic_timer_interrupt+0xf/0x20 [ 217.141766][ C1] [ 217.144682][ C1] RIP: 0010:native_safe_halt+0xe/0x10 [ 217.150033][ C1] Code: ff ff 48 89 df e8 f2 95 8c fa eb 82 e9 07 00 00 00 0f 00 2d e4 45 4b 00 f4 c3 66 90 e9 07 00 00 00 0f 00 2d d4 45 4b 00 fb f4 90 55 48 89 e5 41 57 41 56 41 55 41 54 53 e8 8e 18 42 fa e8 99 [ 217.169622][ C1] RSP: 0018:ffff8880a98e7d78 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 [ 217.178036][ C1] RAX: 1ffffffff1164e11 RBX: ffff8880a98d4340 RCX: 0000000000000000 [ 217.186001][ C1] RDX: dffffc0000000000 RSI: 0000000000000006 RDI: ffff8880a98d4bbc [ 217.193961][ C1] RBP: ffff8880a98e7da8 R08: ffff8880a98d4340 R09: 0000000000000000 [ 217.201914][ C1] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001 [ 217.209866][ C1] R13: ffffffff88b27078 R14: 0000000000000001 R15: 0000000000000000 [ 217.217834][ C1] ? default_idle+0x4e/0x320 [ 217.222408][ C1] arch_cpu_idle+0xa/0x10 [ 217.226723][ C1] default_idle_call+0x36/0x90 [ 217.231473][ C1] do_idle+0x377/0x560 [ 217.235524][ C1] ? arch_cpu_idle_exit+0x80/0x80 [ 217.240532][ C1] cpu_startup_entry+0x1b/0x20 [ 217.245713][ C1] start_secondary+0x34e/0x4c0 [ 217.250547][ C1] ? set_cpu_sibling_map+0x1860/0x1860 [ 217.255992][ C1] secondary_startup_64+0xa4/0xb0 [ 217.262203][ C1] Kernel Offset: disabled [ 217.266526][ C1] Rebooting in 86400 seconds..