Starting mcstransd: [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [ 65.610370][ T24] kauditd_printk_skb: 4 callbacks suppressed [ 65.610381][ T24] audit: type=1800 audit(1563071775.392:33): pid=9262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 65.641274][ T24] audit: type=1800 audit(1563071775.392:34): pid=9262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 69.978295][ T24] audit: type=1400 audit(1563071779.752:35): avc: denied { map } for pid=9439 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.1.11' (ECDSA) to the list of known hosts. 2019/07/14 02:36:26 fuzzer started [ 76.399953][ T24] audit: type=1400 audit(1563071786.172:36): avc: denied { map } for pid=9448 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/07/14 02:36:29 dialing manager at 10.128.0.26:42033 2019/07/14 02:36:29 syscalls: 2488 2019/07/14 02:36:29 code coverage: enabled 2019/07/14 02:36:29 comparison tracing: enabled 2019/07/14 02:36:29 extra coverage: extra coverage is not supported by the kernel 2019/07/14 02:36:29 setuid sandbox: enabled 2019/07/14 02:36:29 namespace sandbox: enabled 2019/07/14 02:36:29 Android sandbox: /sys/fs/selinux/policy does not exist 2019/07/14 02:36:29 fault injection: enabled 2019/07/14 02:36:29 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/07/14 02:36:29 net packet injection: enabled 2019/07/14 02:36:29 net device setup: enabled 02:36:58 executing program 0: [ 108.417922][ T24] audit: type=1400 audit(1563071818.192:37): avc: denied { map } for pid=9464 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=80 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 108.547059][ T9465] IPVS: ftp: loaded support on port[0] = 21 02:36:58 executing program 1: [ 108.684470][ T9465] chnl_net:caif_netlink_parms(): no params data found [ 108.765303][ T9465] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.786947][ T9465] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.805665][ T9465] device bridge_slave_0 entered promiscuous mode 02:36:58 executing program 2: [ 108.822897][ T9468] IPVS: ftp: loaded support on port[0] = 21 [ 108.832680][ T9465] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.843951][ T9465] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.852407][ T9465] device bridge_slave_1 entered promiscuous mode [ 108.911782][ T9465] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 108.936762][ T9465] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 109.042445][ T9465] team0: Port device team_slave_0 added [ 109.054584][ T9468] chnl_net:caif_netlink_parms(): no params data found [ 109.073350][ T9465] team0: Port device team_slave_1 added 02:36:58 executing program 3: [ 109.130462][ T9471] IPVS: ftp: loaded support on port[0] = 21 [ 109.184850][ T9465] device hsr_slave_0 entered promiscuous mode [ 109.242076][ T9465] device hsr_slave_1 entered promiscuous mode [ 109.284468][ T9468] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.299773][ T9468] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.311237][ T9468] device bridge_slave_0 entered promiscuous mode [ 109.333472][ T9468] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.342655][ T9468] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.351470][ T9468] device bridge_slave_1 entered promiscuous mode [ 109.375547][ T9465] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.378898][ T9473] IPVS: ftp: loaded support on port[0] = 21 [ 109.382812][ T9465] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.396578][ T9465] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.403719][ T9465] bridge0: port 1(bridge_slave_0) entered forwarding state 02:36:59 executing program 4: [ 109.426184][ T9468] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 109.444671][ T9468] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 109.523505][ T9468] team0: Port device team_slave_0 added [ 109.548187][ T9468] team0: Port device team_slave_1 added 02:36:59 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x2fd, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x1000005, 0x10, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x2, 0x1) [ 109.722955][ T9468] device hsr_slave_0 entered promiscuous mode [ 109.772197][ T9468] device hsr_slave_1 entered promiscuous mode [ 109.870082][ T9468] debugfs: Directory 'hsr0' with parent '/' already present! [ 109.901642][ T9465] 8021q: adding VLAN 0 to HW filter on device bond0 [ 109.909404][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.928321][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.936911][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 109.956906][ T9476] IPVS: ftp: loaded support on port[0] = 21 [ 109.957985][ T9479] IPVS: ftp: loaded support on port[0] = 21 [ 109.973269][ T9471] chnl_net:caif_netlink_parms(): no params data found [ 110.012553][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 110.023613][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 110.057779][ T9465] 8021q: adding VLAN 0 to HW filter on device team0 [ 110.119009][ T9474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 110.131527][ T9474] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 110.140154][ T9474] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.147217][ T9474] bridge0: port 1(bridge_slave_0) entered forwarding state [ 110.170345][ T9471] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.177536][ T9471] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.186489][ T9471] device bridge_slave_0 entered promiscuous mode [ 110.196079][ T9471] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.203248][ T9471] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.211802][ T9471] device bridge_slave_1 entered promiscuous mode [ 110.223570][ T9474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 110.232270][ T9474] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 110.241132][ T9474] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.248206][ T9474] bridge0: port 2(bridge_slave_1) entered forwarding state [ 110.264641][ T9473] chnl_net:caif_netlink_parms(): no params data found [ 110.287759][ T9471] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 110.301972][ T9471] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 110.344192][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 110.372236][ T9471] team0: Port device team_slave_0 added [ 110.403969][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 110.414647][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 110.423773][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 110.432816][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 110.442132][ T9471] team0: Port device team_slave_1 added [ 110.491789][ T9474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 110.500698][ T9474] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 110.509121][ T9474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 110.517596][ T9474] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 110.526221][ T9474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 110.534925][ T9474] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 110.543821][ T9473] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.551033][ T9473] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.558700][ T9473] device bridge_slave_0 entered promiscuous mode [ 110.601681][ T9471] device hsr_slave_0 entered promiscuous mode [ 110.660463][ T9471] device hsr_slave_1 entered promiscuous mode [ 110.699987][ T9471] debugfs: Directory 'hsr0' with parent '/' already present! [ 110.712214][ T9465] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 110.723607][ T9473] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.730814][ T9473] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.738630][ T9473] device bridge_slave_1 entered promiscuous mode [ 110.771298][ T9479] chnl_net:caif_netlink_parms(): no params data found [ 110.795739][ T9473] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 110.808162][ T9473] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 110.842548][ T9465] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 110.861918][ T9468] 8021q: adding VLAN 0 to HW filter on device bond0 [ 110.918368][ T9479] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.926052][ T9479] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.935681][ T9479] device bridge_slave_0 entered promiscuous mode [ 110.944832][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 110.952969][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 110.962214][ T9473] team0: Port device team_slave_0 added [ 110.970324][ T9473] team0: Port device team_slave_1 added [ 110.977231][ T9468] 8021q: adding VLAN 0 to HW filter on device team0 [ 110.998748][ T9479] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.008202][ T9479] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.016297][ T9479] device bridge_slave_1 entered promiscuous mode [ 111.073078][ T9473] device hsr_slave_0 entered promiscuous mode [ 111.110197][ T9473] device hsr_slave_1 entered promiscuous mode [ 111.169827][ T9473] debugfs: Directory 'hsr0' with parent '/' already present! [ 111.179565][ T24] audit: type=1400 audit(1563071820.952:38): avc: denied { associate } for pid=9465 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 111.209475][ T9479] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 111.237212][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 111.246022][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 111.255034][ T9482] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.262255][ T9482] bridge0: port 1(bridge_slave_0) entered forwarding state [ 111.270796][ T9476] chnl_net:caif_netlink_parms(): no params data found [ 111.282187][ T9479] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 111.316880][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 111.325409][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 111.348408][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 02:37:01 executing program 0: [ 111.376475][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.383623][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 111.392044][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 02:37:01 executing program 0: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x21, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x3, 0x5}}}}}}, 0x0) [ 111.439285][ T9479] team0: Port device team_slave_0 added [ 111.451505][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 111.473378][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 02:37:01 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa029cce98941b86dd6076605100303afffe809c00bd1cb6c9fec5d80000000000000000000000ffff020000000000002300000000000001860090780214000060c5961e00000000ff010000000000001803000000000001ff0200000000000000"], 0x0) [ 111.486168][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 111.490743][ T9495] dccp_invalid_packet: P.Data Offset(66) too large [ 111.495459][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 111.507623][ T9495] dccp_invalid_packet: P.Data Offset(66) too large [ 111.510626][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 111.525495][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 111.556622][ T9479] team0: Port device team_slave_1 added [ 111.571320][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 111.582380][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 111.594064][ T9468] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 02:37:01 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) [ 111.620795][ T9468] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 111.632830][ T9471] 8021q: adding VLAN 0 to HW filter on device bond0 02:37:01 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) [ 111.694733][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 111.711269][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 02:37:01 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) [ 111.737363][ T9471] 8021q: adding VLAN 0 to HW filter on device team0 02:37:01 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) [ 111.812665][ T9479] device hsr_slave_0 entered promiscuous mode [ 111.858683][ T9479] device hsr_slave_1 entered promiscuous mode [ 111.909847][ T9479] debugfs: Directory 'hsr0' with parent '/' already present! [ 111.920630][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 111.928390][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 111.940480][ T9474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 111.949022][ T9474] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 111.958676][ T9474] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.965803][ T9474] bridge0: port 1(bridge_slave_0) entered forwarding state [ 111.974004][ T9474] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 111.982602][ T9476] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.990216][ T9476] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.997889][ T9476] device bridge_slave_0 entered promiscuous mode [ 112.005884][ T9476] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.013332][ T9476] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.021658][ T9476] device bridge_slave_1 entered promiscuous mode [ 112.053394][ T9468] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 112.082912][ T9476] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 112.094949][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 112.103696][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 112.112531][ T3687] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.119736][ T3687] bridge0: port 2(bridge_slave_1) entered forwarding state [ 112.127377][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 112.141863][ T9473] 8021q: adding VLAN 0 to HW filter on device bond0 [ 112.163221][ T9476] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 112.179048][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 112.188008][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 112.197644][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 112.206383][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 112.215019][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 112.223654][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 112.232037][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 112.240425][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 112.256523][ T9473] 8021q: adding VLAN 0 to HW filter on device team0 [ 112.288456][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 112.297822][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 112.306666][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 112.315331][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 112.323851][ T3012] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.330959][ T3012] bridge0: port 1(bridge_slave_0) entered forwarding state [ 112.338797][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 112.347263][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 112.356865][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 112.367666][ T9471] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 112.392243][ T9476] team0: Port device team_slave_0 added [ 112.401502][ T9476] team0: Port device team_slave_1 added 02:37:02 executing program 1: mq_open(&(0x7f0000001840)='cpusetkeyring\x00', 0x841, 0x0, &(0x7f0000001880)={0xff, 0xfffffffffffffb16, 0x6, 0x4, 0x8, 0x7, 0x8, 0x7ff}) [ 112.453132][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 112.462379][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 112.482743][ T3687] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.489885][ T3687] bridge0: port 2(bridge_slave_1) entered forwarding state [ 112.497986][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 112.515168][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 112.533260][ T9471] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 112.603317][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 112.613105][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 112.624876][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 112.636199][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 112.645656][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 112.703033][ T9476] device hsr_slave_0 entered promiscuous mode [ 112.750630][ T9476] device hsr_slave_1 entered promiscuous mode [ 112.790143][ T9476] debugfs: Directory 'hsr0' with parent '/' already present! [ 112.803838][ T9479] 8021q: adding VLAN 0 to HW filter on device bond0 [ 112.831908][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 112.840437][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 112.848660][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 112.857676][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 112.868136][ T9473] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 112.898060][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 112.906253][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 112.916075][ T9479] 8021q: adding VLAN 0 to HW filter on device team0 [ 112.939018][ T9473] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 112.965760][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 02:37:02 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) [ 112.993130][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 113.009382][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.016542][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 113.025646][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 113.050684][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 113.059280][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 113.076703][ T9480] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.083845][ T9480] bridge0: port 2(bridge_slave_1) entered forwarding state [ 113.105203][ T9535] mmap: syz-executor.2 (9535): VmData 18522112 exceed data ulimit 0. Update limits or use boot option ignore_rlimit_data. [ 113.120555][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 113.165694][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 113.186991][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 113.202517][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 113.216530][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 113.242724][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 113.258868][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 02:37:03 executing program 3: [ 113.282555][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 113.295016][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 113.314064][ T9479] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 113.341166][ T9479] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 113.356697][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 113.377419][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 113.419576][ T9476] 8021q: adding VLAN 0 to HW filter on device bond0 [ 113.434221][ T9479] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 113.450630][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 113.458378][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 113.482599][ T9476] 8021q: adding VLAN 0 to HW filter on device team0 [ 113.494409][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 113.503679][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 113.512616][ T3012] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.519751][ T3012] bridge0: port 1(bridge_slave_0) entered forwarding state [ 113.529056][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 113.546573][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 113.556604][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 113.565132][ T9482] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.572236][ T9482] bridge0: port 2(bridge_slave_1) entered forwarding state [ 113.591708][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 113.601681][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 113.610824][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 113.619551][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 113.639107][ T9476] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 113.651092][ T9476] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 113.666277][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 113.686569][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 113.708953][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 113.718205][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 113.726645][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 113.735525][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 113.743957][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 113.760187][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 113.773132][ T9476] 8021q: adding VLAN 0 to HW filter on device batadv0 02:37:03 executing program 4: 02:37:03 executing program 5: 02:37:03 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:03 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x2fd, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x1000005, 0x44831, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f000000d1c0)={0x77359400}) 02:37:03 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) 02:37:03 executing program 3: 02:37:03 executing program 4: 02:37:03 executing program 3: 02:37:03 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) [ 114.007617][ T24] audit: type=1400 audit(1563071823.782:39): avc: denied { map } for pid=9561 comm="syz-executor.1" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=30727 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 02:37:03 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) 02:37:03 executing program 5: 02:37:03 executing program 3: 02:37:03 executing program 4: 02:37:04 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:04 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) 02:37:04 executing program 1: msgrcv(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="04000000200000000000000000000000000000000000000000000000000000003e5e000000000200"/68], 0x54, 0x1, 0x1000) modify_ldt$write2(0x11, &(0x7f0000000000)={0x77ac, 0xffffffffffffffff, 0xffffffffffffffff, 0x1f99, 0x9, 0x20, 0xe3, 0x10000, 0x2, 0x6}, 0xb) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0xe9, 0x200001) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0xc000000) msgsnd(0x0, &(0x7f00000006c0)={0x3}, 0x8, 0x0) move_mount(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) 02:37:04 executing program 3: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$CAPI_INSTALLED(r0, 0x80024322) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) 02:37:04 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x75}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r0 = pkey_alloc(0x0, 0x1) pkey_free(r0) pipe2(&(0x7f0000000080), 0x80800) prctl$PR_GET_CHILD_SUBREAPER(0x25) 02:37:04 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@broadcast, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty=0x14}}}}}, 0x0) syz_emit_ethernet(0x1032, &(0x7f0000001140)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)={0x1, 0x4, [0x6d2, 0x810, 0x682, 0x4be]}) 02:37:04 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:04 executing program 2: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) [ 114.710488][ T24] audit: type=1400 audit(1563071824.482:40): avc: denied { prog_load } for pid=9597 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 02:37:04 executing program 2: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) 02:37:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000065140400010000000704000001000a00b7050000000000006a0a00fe00000000850000001a000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000001c0)={0x0, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000200)={0x20, 0x0, 0x10002, 0x9}) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000240)={r1, 0x46e3}) 02:37:04 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mknod(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="2e2f22f46c79306d33af019aaa11e7de2f66696c673000d30f3eada35f796d2155fe6fddfcd758b70ac45a3e22f9ef5f99268e5ff2216124de597efcbb08ee3cc065eb99b128ec22a3073ef7bf454cb58737d28e84131aa384ad14d51d"], &(0x7f0000000000)='./file0\x00', 0x0, 0x201000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x3, 0x2) io_uring_enter(r0, 0x2, 0x432, 0x3, &(0x7f0000000040)={0x4}, 0x8) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000140)={0x30000000, 0x1, 0x3d}) 02:37:04 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) [ 114.796140][ T24] audit: type=1400 audit(1563071824.512:41): avc: denied { prog_run } for pid=9597 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 02:37:04 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x6f, 0x12400) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000140)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x80100, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 02:37:04 executing program 4: userfaultfd(0x0) r0 = creat(&(0x7f0000000500)='./file0\x00', 0x7ffffc) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getpgid(0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='trusted.overlay.opaque\x00', &(0x7f00000012c0)='y\x00', 0x2, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x800) syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) 02:37:04 executing program 2: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) 02:37:04 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) [ 115.110818][ C1] hrtimer: interrupt took 63212 ns 02:37:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)=@setlink={0x2c, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_XDP={0xc, 0x2b, [@IFLA_XDP_FLAGS={0x8}]}]}, 0x2c}}, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000040), &(0x7f0000000100)=0x4) 02:37:05 executing program 5: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x1, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0xffffffffffffffda, 0x2}, 0x10) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x48, r1, 0x120, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x1a}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x44}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @broadcast}}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x40800}, 0x80) chdir(&(0x7f0000000380)='./file0\x00') symlink(&(0x7f00000000c0)='..', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000280)='./file0/file0\x00', 0x2000000000002) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000140)) 02:37:05 executing program 2: prlimit64(0x0, 0x0, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) 02:37:05 executing program 0: signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) [ 115.351570][ T9632] loop3: p1 < > p4 02:37:05 executing program 1: clock_gettime(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000280)='{:security]#mime_type&\x00', 0xfffffffffffffffb) request_key(&(0x7f0000000340)='blacklist\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f0000000440)='/dev/radio#\x00', 0xfffffffffffffffe) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) socketpair(0x1d, 0xf, 0x519d4033, &(0x7f00000003c0)) getpeername$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @empty}, &(0x7f00000001c0)=0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000500)=@in={0x2, 0x4e20, @broadcast}, 0x80, 0x0}, 0x3) umount2(&(0x7f0000000800)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x1, 0x2) [ 115.383323][ T24] audit: type=1400 audit(1563071825.162:42): avc: denied { create } for pid=9654 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 02:37:05 executing program 2: prlimit64(0x0, 0x0, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) [ 115.487829][ T9632] loop3: p4 start 1854537728 is beyond EOD, truncated [ 115.584724][ T24] audit: type=1400 audit(1563071825.162:43): avc: denied { write } for pid=9654 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 02:37:05 executing program 0: signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:05 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x200040, 0x0) futimesat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={{0x77359400}, {0x0, 0x7530}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000001180)="11dca5055e0bcfec7be070") sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 115.748836][ T24] audit: type=1400 audit(1563071825.162:44): avc: denied { read } for pid=9654 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 115.900790][ T9686] netlink: 'syz-executor.5': attribute type 8 has an invalid length. [ 115.917346][ T9686] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 115.936722][ T9632] loop3: p1 < > p4 [ 115.979236][ T9632] loop3: p4 start 1854537728 is beyond EOD, truncated 02:37:05 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x6f, 0x12400) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000140)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x80100, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 02:37:05 executing program 4: userfaultfd(0x0) r0 = creat(&(0x7f0000000500)='./file0\x00', 0x7ffffc) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getpgid(0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='trusted.overlay.opaque\x00', &(0x7f00000012c0)='y\x00', 0x2, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x800) syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) 02:37:05 executing program 0: signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:05 executing program 2: prlimit64(0x0, 0x0, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) 02:37:05 executing program 1: clock_gettime(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000280)='{:security]#mime_type&\x00', 0xfffffffffffffffb) request_key(&(0x7f0000000340)='blacklist\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f0000000440)='/dev/radio#\x00', 0xfffffffffffffffe) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) socketpair(0x1d, 0xf, 0x519d4033, &(0x7f00000003c0)) getpeername$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @empty}, &(0x7f00000001c0)=0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000500)=@in={0x2, 0x4e20, @broadcast}, 0x80, 0x0}, 0x3) umount2(&(0x7f0000000800)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x1, 0x2) 02:37:06 executing program 2: prlimit64(0x0, 0x20000000002, 0x0, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) 02:37:06 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) [ 116.351628][ T9699] loop3: p1 < > p4 02:37:06 executing program 2: prlimit64(0x0, 0x20000000002, 0x0, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) [ 116.412016][ T9699] loop3: p4 start 1854537728 is beyond EOD, truncated 02:37:06 executing program 1: clock_gettime(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000280)='{:security]#mime_type&\x00', 0xfffffffffffffffb) request_key(&(0x7f0000000340)='blacklist\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f0000000440)='/dev/radio#\x00', 0xfffffffffffffffe) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) socketpair(0x1d, 0xf, 0x519d4033, &(0x7f00000003c0)) getpeername$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @empty}, &(0x7f00000001c0)=0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000500)=@in={0x2, 0x4e20, @broadcast}, 0x80, 0x0}, 0x3) umount2(&(0x7f0000000800)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x1, 0x2) 02:37:06 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:06 executing program 2: prlimit64(0x0, 0x20000000002, 0x0, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) 02:37:06 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x200040, 0x0) futimesat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={{0x77359400}, {0x0, 0x7530}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000001180)="11dca5055e0bcfec7be070") sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:06 executing program 3: r0 = fanotify_init(0x58, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) r4 = getuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000380)={{{@in=@local, @in6=@empty, 0x4e23, 0x0, 0x4e22, 0x5, 0xa, 0x80, 0xa0, 0xff, r3, r4}, {0x1, 0x4, 0x1000, 0x24ffd695, 0xffffffff, 0x8f36, 0x100000001, 0x1}, {0x40, 0x9b78, 0x427, 0xfe}, 0x8001, 0x6e6bb6, 0x2, 0x1, 0x3, 0x3}, {{@in6=@remote, 0x4d2, 0xff}, 0x2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3507, 0x3, 0x2, 0xfffffffffffffffc, 0x3, 0xffffffff, 0x100}}, 0xe8) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200, 0x0) setsockopt$packet_buf(r5, 0x107, 0x16, &(0x7f0000000040)="ee53d215fd6d0fa5772cdd4c1b0d51ed79fb3cf9f3754178fe3839bb56ce6fdc5a5cf32aac6b96491a5990d7a9097f05af129636000a8720ab5aee2c0cca365588d4f0191f5b1342b23122ed36253ac705876e71bc621fc277d89361fc77df80f55bf158ed8e9ffea6c8d7089b495e36e4c5d14f0c86ab4d6dbc44430aa816acec05d02b21d287ec64f0780dec70d154e2c503ef353e42ea6f1d8417bed6230c3598e4e630393d96aeb70860d07ab48f4d3d6ddf878ab146bc04a75508a613f9a9949beb6ed1fb8bdb066d174d266adf2219bcc4678347ee33b2b16470dc8cdf055d20f4bcbcc7b5ba37969bed46ed", 0xef) fsetxattr$security_selinux(r0, &(0x7f0000000180)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:systemd_logind_var_run_t:s0\x00', 0x2e, 0x3) 02:37:06 executing program 1: userfaultfd(0x0) r0 = creat(&(0x7f0000000500)='./file0\x00', 0x7ffffc) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getpgid(0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='trusted.overlay.opaque\x00', &(0x7f00000012c0)='y\x00', 0x2, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x800) syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) 02:37:06 executing program 4: clock_gettime(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000280)='{:security]#mime_type&\x00', 0xfffffffffffffffb) request_key(&(0x7f0000000340)='blacklist\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f0000000440)='/dev/radio#\x00', 0xfffffffffffffffe) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) socketpair(0x1d, 0xf, 0x519d4033, &(0x7f00000003c0)) getpeername$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @empty}, &(0x7f00000001c0)=0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000500)=@in={0x2, 0x4e20, @broadcast}, 0x80, 0x0}, 0x3) umount2(&(0x7f0000000800)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x1, 0x2) 02:37:06 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 02:37:06 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) [ 117.018706][ T9740] netlink: 'syz-executor.5': attribute type 8 has an invalid length. 02:37:06 executing program 2 (fault-call:1 fault-nth:0): prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 02:37:06 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) [ 117.098938][ T9740] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 02:37:06 executing program 3: r0 = fanotify_init(0x58, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) r4 = getuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000380)={{{@in=@local, @in6=@empty, 0x4e23, 0x0, 0x4e22, 0x5, 0xa, 0x80, 0xa0, 0xff, r3, r4}, {0x1, 0x4, 0x1000, 0x24ffd695, 0xffffffff, 0x8f36, 0x100000001, 0x1}, {0x40, 0x9b78, 0x427, 0xfe}, 0x8001, 0x6e6bb6, 0x2, 0x1, 0x3, 0x3}, {{@in6=@remote, 0x4d2, 0xff}, 0x2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3507, 0x3, 0x2, 0xfffffffffffffffc, 0x3, 0xffffffff, 0x100}}, 0xe8) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200, 0x0) setsockopt$packet_buf(r5, 0x107, 0x16, &(0x7f0000000040)="ee53d215fd6d0fa5772cdd4c1b0d51ed79fb3cf9f3754178fe3839bb56ce6fdc5a5cf32aac6b96491a5990d7a9097f05af129636000a8720ab5aee2c0cca365588d4f0191f5b1342b23122ed36253ac705876e71bc621fc277d89361fc77df80f55bf158ed8e9ffea6c8d7089b495e36e4c5d14f0c86ab4d6dbc44430aa816acec05d02b21d287ec64f0780dec70d154e2c503ef353e42ea6f1d8417bed6230c3598e4e630393d96aeb70860d07ab48f4d3d6ddf878ab146bc04a75508a613f9a9949beb6ed1fb8bdb066d174d266adf2219bcc4678347ee33b2b16470dc8cdf055d20f4bcbcc7b5ba37969bed46ed", 0xef) fsetxattr$security_selinux(r0, &(0x7f0000000180)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:systemd_logind_var_run_t:s0\x00', 0x2e, 0x3) 02:37:07 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x200040, 0x0) futimesat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={{0x77359400}, {0x0, 0x7530}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000001180)="11dca5055e0bcfec7be070") sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:07 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 02:37:07 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) [ 117.359123][ T9761] netlink: 'syz-executor.5': attribute type 8 has an invalid length. 02:37:07 executing program 4: r0 = fanotify_init(0x58, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) r4 = getuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000380)={{{@in=@local, @in6=@empty, 0x4e23, 0x0, 0x4e22, 0x5, 0xa, 0x80, 0xa0, 0xff, r3, r4}, {0x1, 0x4, 0x1000, 0x24ffd695, 0xffffffff, 0x8f36, 0x100000001, 0x1}, {0x40, 0x9b78, 0x427, 0xfe}, 0x8001, 0x6e6bb6, 0x2, 0x1, 0x3, 0x3}, {{@in6=@remote, 0x4d2, 0xff}, 0x2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3507, 0x3, 0x2, 0xfffffffffffffffc, 0x3, 0xffffffff, 0x100}}, 0xe8) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200, 0x0) setsockopt$packet_buf(r5, 0x107, 0x16, &(0x7f0000000040)="ee53d215fd6d0fa5772cdd4c1b0d51ed79fb3cf9f3754178fe3839bb56ce6fdc5a5cf32aac6b96491a5990d7a9097f05af129636000a8720ab5aee2c0cca365588d4f0191f5b1342b23122ed36253ac705876e71bc621fc277d89361fc77df80f55bf158ed8e9ffea6c8d7089b495e36e4c5d14f0c86ab4d6dbc44430aa816acec05d02b21d287ec64f0780dec70d154e2c503ef353e42ea6f1d8417bed6230c3598e4e630393d96aeb70860d07ab48f4d3d6ddf878ab146bc04a75508a613f9a9949beb6ed1fb8bdb066d174d266adf2219bcc4678347ee33b2b16470dc8cdf055d20f4bcbcc7b5ba37969bed46ed", 0xef) fsetxattr$security_selinux(r0, &(0x7f0000000180)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:systemd_logind_var_run_t:s0\x00', 0x2e, 0x3) [ 117.418031][ T9761] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 02:37:07 executing program 3: r0 = fanotify_init(0x58, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) r4 = getuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000380)={{{@in=@local, @in6=@empty, 0x4e23, 0x0, 0x4e22, 0x5, 0xa, 0x80, 0xa0, 0xff, r3, r4}, {0x1, 0x4, 0x1000, 0x24ffd695, 0xffffffff, 0x8f36, 0x100000001, 0x1}, {0x40, 0x9b78, 0x427, 0xfe}, 0x8001, 0x6e6bb6, 0x2, 0x1, 0x3, 0x3}, {{@in6=@remote, 0x4d2, 0xff}, 0x2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3507, 0x3, 0x2, 0xfffffffffffffffc, 0x3, 0xffffffff, 0x100}}, 0xe8) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200, 0x0) setsockopt$packet_buf(r5, 0x107, 0x16, &(0x7f0000000040)="ee53d215fd6d0fa5772cdd4c1b0d51ed79fb3cf9f3754178fe3839bb56ce6fdc5a5cf32aac6b96491a5990d7a9097f05af129636000a8720ab5aee2c0cca365588d4f0191f5b1342b23122ed36253ac705876e71bc621fc277d89361fc77df80f55bf158ed8e9ffea6c8d7089b495e36e4c5d14f0c86ab4d6dbc44430aa816acec05d02b21d287ec64f0780dec70d154e2c503ef353e42ea6f1d8417bed6230c3598e4e630393d96aeb70860d07ab48f4d3d6ddf878ab146bc04a75508a613f9a9949beb6ed1fb8bdb066d174d266adf2219bcc4678347ee33b2b16470dc8cdf055d20f4bcbcc7b5ba37969bed46ed", 0xef) fsetxattr$security_selinux(r0, &(0x7f0000000180)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:systemd_logind_var_run_t:s0\x00', 0x2e, 0x3) 02:37:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create1(0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x60000, 0x0) syz_read_part_table(0x1, 0x7, &(0x7f00000017c0)=[{&(0x7f0000000140)="8070dababcf8fda370479c37320fe1fb385b3ea7d627113a2e4ef12535ae8979c1a12e07fe3eb28ec37622a20fca2ce674bd0fde01829456fb54c7ae9342d61daaf03e97c462fecfae21113970c53971cf54de7e460cc35821071f1cc193b181a2d3eb02336480f98b4756ab7285a8d0b1f2c49d58e2075b9c1d1ea49351dfc4db77696386", 0x85, 0x2}, {&(0x7f00000006c0)="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", 0x1000, 0x1}, {&(0x7f0000000200)="e550cef259a745874a119ef76149ecd9569f850b045965050b40f36f3d655d37790884c409c6d311db99c6083a9dca0a997d08b069ab586bcc3030dd8555d4e6abc4efbd2cc3332732bda717670e2cf807d32d0ef4f8d1b928bcbb390625b8d713ba76951fe471fe74ef78a6b632d985fdfdb0c67d26fae7ef56e4390bdf0d347ef04b31054399c4c7ad945ce1c1d21f8217ee5e0e167c660065fec6c728beb59937", 0xa2, 0x7fffffff}, {&(0x7f00000002c0)="3b69efd3d2371c5343ed72b1757ac21f6a0d1389c5cd4e60ec5e84466d9c8b1ea4513f99986a", 0x26, 0x7}, {&(0x7f0000000300)="964d8a1fbe72dd32d0f85058dd43ce0efbcfca3b08e0e958c36d034e2e57444c95d543b104427be630a5805a6bc7296f334b6cfb7ae2f8b3a1eff8acc091cdfe431938b0033476b6122e5be5e4bb0544b47e04763f00304cb0f96928911f1340c068703fd94baf48e3de756cd8ab33fa985249a2a10bdf", 0x77, 0x2}, {&(0x7f0000000380)="0774272be99409cc01b12d59c0d6d1fab1ef09467ce39da46ff52600a5f9c374f2d30f37fe684fa262d88d71d1dcb992ccb4b0e5a1446757fbfe5dc669f75c2ace25737a62ce28c951a5", 0x4a, 0x8}, {&(0x7f00000016c0)="a3eb7dcb6234858f9145ffa5f7b05f05c2c052a32a71cc5c63e366a49e7ab00d452731fde462a8376d6566ecd121c6f6f34650e7cd1aa93ed224909e22cdadf80caa8a8529c3b02df2dbaf8ee8f35dea87fc5cdd0ca7e2ff00403c8805e8ded63d3327ea503c457fd0a49240162bd4759af1fe51a69b74d230ab0eb231164e6af073ec6d7271b41eaa1c2fb64db893de60b3cfa4f1291f0aa58addc888cf24381a448023cc2d29f9caab6c0030580f7ad41a0ff4997076adc43138c4b31736d15185c6234bdef5a55850b364c42f3600bc2ffcb5ba48fadbe8fdaac4afc09685cd6cd6", 0xe3, 0x7}]) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x0, 0x0) pipe2(&(0x7f0000000000), 0x80800) 02:37:07 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x200040, 0x0) futimesat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={{0x77359400}, {0x0, 0x7530}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000001180)="11dca5055e0bcfec7be070") sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:07 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1002, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 02:37:07 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:07 executing program 4: r0 = fanotify_init(0x58, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) r4 = getuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000380)={{{@in=@local, @in6=@empty, 0x4e23, 0x0, 0x4e22, 0x5, 0xa, 0x80, 0xa0, 0xff, r3, r4}, {0x1, 0x4, 0x1000, 0x24ffd695, 0xffffffff, 0x8f36, 0x100000001, 0x1}, {0x40, 0x9b78, 0x427, 0xfe}, 0x8001, 0x6e6bb6, 0x2, 0x1, 0x3, 0x3}, {{@in6=@remote, 0x4d2, 0xff}, 0x2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3507, 0x3, 0x2, 0xfffffffffffffffc, 0x3, 0xffffffff, 0x100}}, 0xe8) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200, 0x0) setsockopt$packet_buf(r5, 0x107, 0x16, &(0x7f0000000040)="ee53d215fd6d0fa5772cdd4c1b0d51ed79fb3cf9f3754178fe3839bb56ce6fdc5a5cf32aac6b96491a5990d7a9097f05af129636000a8720ab5aee2c0cca365588d4f0191f5b1342b23122ed36253ac705876e71bc621fc277d89361fc77df80f55bf158ed8e9ffea6c8d7089b495e36e4c5d14f0c86ab4d6dbc44430aa816acec05d02b21d287ec64f0780dec70d154e2c503ef353e42ea6f1d8417bed6230c3598e4e630393d96aeb70860d07ab48f4d3d6ddf878ab146bc04a75508a613f9a9949beb6ed1fb8bdb066d174d266adf2219bcc4678347ee33b2b16470dc8cdf055d20f4bcbcc7b5ba37969bed46ed", 0xef) fsetxattr$security_selinux(r0, &(0x7f0000000180)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:systemd_logind_var_run_t:s0\x00', 0x2e, 0x3) 02:37:07 executing program 3: r0 = fanotify_init(0x58, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) r4 = getuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000380)={{{@in=@local, @in6=@empty, 0x4e23, 0x0, 0x4e22, 0x5, 0xa, 0x80, 0xa0, 0xff, r3, r4}, {0x1, 0x4, 0x1000, 0x24ffd695, 0xffffffff, 0x8f36, 0x100000001, 0x1}, {0x40, 0x9b78, 0x427, 0xfe}, 0x8001, 0x6e6bb6, 0x2, 0x1, 0x3, 0x3}, {{@in6=@remote, 0x4d2, 0xff}, 0x2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3507, 0x3, 0x2, 0xfffffffffffffffc, 0x3, 0xffffffff, 0x100}}, 0xe8) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200, 0x0) setsockopt$packet_buf(r5, 0x107, 0x16, &(0x7f0000000040)="ee53d215fd6d0fa5772cdd4c1b0d51ed79fb3cf9f3754178fe3839bb56ce6fdc5a5cf32aac6b96491a5990d7a9097f05af129636000a8720ab5aee2c0cca365588d4f0191f5b1342b23122ed36253ac705876e71bc621fc277d89361fc77df80f55bf158ed8e9ffea6c8d7089b495e36e4c5d14f0c86ab4d6dbc44430aa816acec05d02b21d287ec64f0780dec70d154e2c503ef353e42ea6f1d8417bed6230c3598e4e630393d96aeb70860d07ab48f4d3d6ddf878ab146bc04a75508a613f9a9949beb6ed1fb8bdb066d174d266adf2219bcc4678347ee33b2b16470dc8cdf055d20f4bcbcc7b5ba37969bed46ed", 0xef) fsetxattr$security_selinux(r0, &(0x7f0000000180)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:systemd_logind_var_run_t:s0\x00', 0x2e, 0x3) [ 117.860328][ T9790] netlink: 'syz-executor.5': attribute type 8 has an invalid length. 02:37:07 executing program 4: r0 = fanotify_init(0x58, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) r4 = getuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000380)={{{@in=@local, @in6=@empty, 0x4e23, 0x0, 0x4e22, 0x5, 0xa, 0x80, 0xa0, 0xff, r3, r4}, {0x1, 0x4, 0x1000, 0x24ffd695, 0xffffffff, 0x8f36, 0x100000001, 0x1}, {0x40, 0x9b78, 0x427, 0xfe}, 0x8001, 0x6e6bb6, 0x2, 0x1, 0x3, 0x3}, {{@in6=@remote, 0x4d2, 0xff}, 0x2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3507, 0x3, 0x2, 0xfffffffffffffffc, 0x3, 0xffffffff, 0x100}}, 0xe8) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200, 0x0) setsockopt$packet_buf(r5, 0x107, 0x16, &(0x7f0000000040)="ee53d215fd6d0fa5772cdd4c1b0d51ed79fb3cf9f3754178fe3839bb56ce6fdc5a5cf32aac6b96491a5990d7a9097f05af129636000a8720ab5aee2c0cca365588d4f0191f5b1342b23122ed36253ac705876e71bc621fc277d89361fc77df80f55bf158ed8e9ffea6c8d7089b495e36e4c5d14f0c86ab4d6dbc44430aa816acec05d02b21d287ec64f0780dec70d154e2c503ef353e42ea6f1d8417bed6230c3598e4e630393d96aeb70860d07ab48f4d3d6ddf878ab146bc04a75508a613f9a9949beb6ed1fb8bdb066d174d266adf2219bcc4678347ee33b2b16470dc8cdf055d20f4bcbcc7b5ba37969bed46ed", 0xef) fsetxattr$security_selinux(r0, &(0x7f0000000180)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:systemd_logind_var_run_t:s0\x00', 0x2e, 0x3) 02:37:07 executing program 3: fanotify_init(0x58, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) r3 = getuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000380)={{{@in=@local, @in6=@empty, 0x4e23, 0x0, 0x4e22, 0x5, 0xa, 0x80, 0xa0, 0xff, r2, r3}, {0x1, 0x4, 0x1000, 0x24ffd695, 0xffffffff, 0x8f36, 0x100000001, 0x1}, {0x40, 0x9b78, 0x427, 0xfe}, 0x8001, 0x6e6bb6, 0x2, 0x1, 0x3, 0x3}, {{@in6=@remote, 0x4d2, 0xff}, 0x2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3507, 0x3, 0x2, 0xfffffffffffffffc, 0x3, 0xffffffff, 0x100}}, 0xe8) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200, 0x0) setsockopt$packet_buf(r4, 0x107, 0x16, &(0x7f0000000040)="ee53d215fd6d0fa5772cdd4c1b0d51ed79fb3cf9f3754178fe3839bb56ce6fdc5a5cf32aac6b96491a5990d7a9097f05af129636000a8720ab5aee2c0cca365588d4f0191f5b1342b23122ed36253ac705876e71bc621fc277d89361fc77df80f55bf158ed8e9ffea6c8d7089b495e36e4c5d14f0c86ab4d6dbc44430aa816acec05d02b21d287ec64f0780dec70d154e2c503ef353e42ea6f1d8417bed6230c3598e4e630393d96aeb70860d07ab48f4d3d6ddf878ab146bc04a75508a613f9a9949beb6ed1fb8bdb066d174d266adf2219bcc4678347ee33b2b16470dc8cdf055d20f4bcbcc7b5ba37969bed46ed", 0xef) [ 117.901395][ T9790] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 02:37:07 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:07 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 02:37:07 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x200040, 0x0) futimesat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={{0x77359400}, {0x0, 0x7530}}) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create1(0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x60000, 0x0) syz_read_part_table(0x1, 0x7, &(0x7f00000017c0)=[{&(0x7f0000000140)="8070dababcf8fda370479c37320fe1fb385b3ea7d627113a2e4ef12535ae8979c1a12e07fe3eb28ec37622a20fca2ce674bd0fde01829456fb54c7ae9342d61daaf03e97c462fecfae21113970c53971cf54de7e460cc35821071f1cc193b181a2d3eb02336480f98b4756ab7285a8d0b1f2c49d58e2075b9c1d1ea49351dfc4db77696386", 0x85, 0x2}, {&(0x7f00000006c0)="51582d1009c4ca2cee5116541a2ea7d2b5289b84d3bfcdc6be0b196e73a8a4b82456367b7a0335b78d6b4290b7c6f6fc71505be2dce33a2eda0d54b9527648a98c82d5e876bea482e2554cf298bea467e235fd334f16b06ca510dbf88ffd4a225981b4dd3d0911ff8d578e529e85df981905a0dd112de494a41e3da63f07768771ee3dfc072c2ddd77f27e3f77a8c36fc1368a4c46417859a9782ab4ecf97abd8d178417dfcc079d87fa41c52ee741571e1c4ce79a6389ddc8121b7e118d06ca75d353e6d95a027667a968ba3088419af4ff6392ff86d84652fcc0eb7f651d669d5af1998ce068c03e25a444f8b727149a3a723f7d16678f06ee279943cc3d4111390068495a7af403a40bbafb3c02b6396f8f363db0721a2b0dc389f2f6fb0d48333e2f82fd118e1a8d634292dca41b6508a66876bf64b2a2d8ac6e227088ac408a40d4f0e9210b149232219a43aa1bb24d67380d2a99d3159c00afa6b3a2313a1623935b0a0e8ff27c79f0b89272cde661e4c87d47643f0f579a1023692d19efcb7cf0e6fe58de8e4c891b70c1b998bea7846f1e9adf9488a62fd37c636927fd227d8ac44184eb9a16b396dd91d33748b1147f14e351b833bd4341956b3f43e5384f7e9e685d805de521f9e52dd0f8f06659d356b314bf6e644cd802ccc073a9d6fa9bee3e2eaf6d6337ee39708a531527d3b23bbae766fff1b467bb1a5a37dec720e7fc8cf469119a4523ed0b7ad084e856aa5887f23e560273b9db0c75737c72e05f8a1c2fb927ee65e4911212bda1fab4e1036dff45f39b87ee89e88716a10ed8575b3b5cbc95aa34488b41141cfd204e1c4c5a4da867301d6f40ba60fc74df5d71fdd75687242bf11ade4d855859d69bf65329d1cc9a0beaed985c4a97241cdd5fcbb3fff2aa52e752d719669e6a4bad59d4202d32ece205dc92b86a461b9490fb2ec31cc2ead599c79120ca4b5dfa55cca175ad2afc760f429327b42db9fc8e528925e2de0fc10fe1c674045948851560ab83fc029f9b8c61005cb442e62e63600083908cb1eda4c381c63c81a9332240dc6797d828971723e7b42e176b9a3eb37e42586f6040b6e24efd7278532baebb4a866abc7b2d1956b0f4d5efa4d7ce2f055bfe5ae7bfbda3421da66a72df05e0e5636281b5e7d9e449ae79af18929440c16b2e3d6a97e07fa6b0fd2251144d556ec2ca62abbc447715c9822656fd889776c74e504c72eb19ab4271996b03169b2270f28294e7b5e310da5ace8b98051df365b7ec59fe4d7cc93c78af9fca84541f2f65a2ca57c10ac25fc6a729aa209e43f62c41c41e04a01f3cd41d9383cd9d25c796315eea853f7a33520562808eb1d7af049fa67666c7d406f59a8e9ec40c9aed65f236aad2334bf38df425c576fc5e03628b4f29b6fc23baf573e96b9e82fae0181933e1c02126ebed39a327bee781615331eedb2ef5b5bbeb76c9801a5296d0fb8b2ca4814c4e8e4057b1a3a94d23a807c8a29d26ff8380ecc656feab24e31a1a6cbf3397bf70029050416d7bf41e1313d0e5edd61355d4028ed6eb45cffba9d22d2f1efe9c9a00e8dbe972fb4ae2632bdcfdf0e032838f9a060eada8e11f6805a553bf2bc72521b6ed0c4b62a1b851291a70f9cc46f52298fbc93f79088bf3aaab88e0ecd764515319bd7722df8f7becfb4dfea04c4bd67cc4c877c66df9919f9371e28d445b7f3848fcf1f4ca757c4fba5d4f05638c008bacdcfd77e1daa97b9fab9063ff231f9d19b76cfd8fbf99df10451efca94cb292f83fd21f4a1d8c364e6d550549b58d0010087966cc4517a202efcca85142f1364b34f9f35f5d2f8b4fa8fd1dc21d69e8a57357d2a37879ae0a4c3c8548c052e789dcc70355d01faba6632eff275b38c2d3f4ba5faba874a6cc5a63f71985ac833a8464ae585cb6eb3b67fd11bec883ec6d29149fc4125318336ee6014d990d793c07982d46d04c1fa70917469026597f3fdddcddae3d1dc3ed6410636de4cc8b28cd122b48051ad2df014ade16f56ed2b08e5d803a74b9311542686093876174a42e0bcd90a25ade97b79176b516cdfcd2c2500f3d3447e2ec055cfb3987cc18a44c138d173a67ffe4a21233153ee7cf1744e11b6b469295d59ef90c2d3c9cce3ce33bc01cbf253caa670628be091359bca25f71624149cdfa6d71f5248589ab9394d5168c94db4800ed740b228594f799ccc2aaca0f62cf31c50ec5f2c81204774438636d91dd6be5b51f6fd13c4e460c4f52c3625933aafacf1a2a22e150acac3e933c5a8bc18edaad1a841d0473e62761434c30baafe8da1696f2c679b4fab5ed446736940dde45d7f0324fdbda642adfb0e550efd815c2453016ca11131fd63d8801c0c8578a8221fbd0d470751dcd9648064a5b18ebb8ccd75e33eaf7fda89cd32d7be446e760334005fb93703d5e162a55b0f3ce36dc8797c4f945b0d40a806b322fa63aec35ab3124215b3db925efaeb44568638170dd6e592838d6e39856bdeaa75ef03d1db68bd0717f90b68cb4061b5098ac2089a80853749585d8213469cc6af3e0dd3eddfab651a3bed1a885899f8b09e396a550f2d898231141d39743a485738a027ac2290ee911662bbbe341c8230771eeb003b2c8bc83cf4685df6e9de1ee8f81184fd563dfb0e161b425a56082712dc37da6566bc60f3bbf1a2055a2a95f45fe90d734580f3062596e0dc0e7dfaf43182b825c38f2a1c26341f1e206b6709a7e79f044577202d4e614909c34aa356f24e4e518145580f3afa23144a16201475352b5de9526b6d76427bd3b983fcefd795546358d9e080dac44f6437026fd137540f3ce28eb52c5efb2e75d196f4d692750450f9f08eee66686381bf6b9603b4283babb844e970a8671f6d6f85e608f058086171e58d3f334e4988296bdaa7743d81b1ebd694292589a7243a601b1d5cde29bd9343d1dbc631ebb12a0daf308c738b883071680f22885b5b3aeeb180960a074ce574a85e0a20ff7a45e8748431b55b72c71d1d0dd8be9e550d1df2abb8aee8a45f9e9685b75f6893c31f45db92eb0f2b279f05b06d48bddca1fb10c2e77c49f9c27212134da9da6702d78bd1b28cd4bf22e7540e7cfb393b5445fe91b944e931b6638c3af8025a7cdf6bf6bc349d1ff6a3519c9671a11e57d745b12e9216ae9a7a40fdab18c526b24712c4cad425045788469796d378bf5db945ffe12d5bb710a9839fe729b2d3ae81de1c7d8eb494c15e30f7d0bb4fccf3f6652d14bf30f5b19ef6f4695b323452451dca447f039c08b12b1c810514b0eed328a8ce154cb70df180319169dd806a4734c3b9e0a7814bffa8f7ad7e252cc6f58083d7578a5a611ac40ec638b7e439f5a0ddb5527162b453fd6da3b6d571512f4f73469cdc35d0aa00657a8ffbf52b2bac4c007fa68e940969da83a03fb7f29c73bd8f35f7ea2ca4b9c019cd96cce8150933c0ea939edad8538874df0bedf6e9434e9accc2c7f13aeb144876daf21319632ef6b33e423f7fa161a2563a6ca074f67ed2f41ef276a31455488823b668826d4a1107af99f41b7d472341f9a125204217064d9c5ad7e6b252cddae296dfc9204f97d8bc6ffc87c9b0ee4862cc96f925351ebbdd161616b64022dade54170a16799259ea8edf140a646abbc705edd6320d91d9d366e4e2a1bbe7455478f7f142f9e0222479a98ca6bc809c884351f14c0b663ef5088b3c8e976e15e1a6ec329b84380f833612b5f434b73d582553cfdba9de1d5ae2d499e12c90f1f05d9acd09e6f7841e8e21b73e298af437203f9b36c9a8dea95411e7eb45a0b58be0d1f03bb43a02c1702aae0cb8e2a228e1f7d6c689d9cae1e0844f70b192a5ce7623df6dd7805028358f0e57f8fcf7052fff210c1ee7a5abe291de16371901bede2fcfcad211be033a2a05b8c4b29135f058639320219d41996c763d8094cd1c50b40cbc23c993224b7dbf4ac0dfb9042dfb25b7c1f8ecb1fe165013f4a8e0a2dfac02efe169abdbc3b977a35cb1d3e9362b6ccb451bb90875092001b57d3fd2794d00ab0ce1c6ee3aff3b8a489f6004b2324de124274bd935132d2c9dd6436036c5301db99a1ac3b656bc245f42ade2d59d516fb033790544d509aa6d9fe961aa6a719a1028d1b963a40fb67231b5b2ef30b375c80c343b2c8fa1f8df8368849177646ee0ba506fe553caef98c3c5e252e65284130bc46d228aeebcd2e1aa8662e798a48bdc4b3d963481bd246868172f957352a4645c85f8df8f73c278e8fc304bab7d0c9e8e243ffc0ba8a9e758b9a16aa37d5a1809a82fded3d5c292595e2e1561a7641ac53c2c71cffeb25f90ab1339f74b56e09c5b138658d39337baab17375e54be75372ef17dc7b1c65ae34d4354a281b2d578ae5266cdccfbd4e58a41b898a6ec4ccb530c90767734f776d107a99f27a14a8e11b621a19e48137206d47b628d88fce3abc5ccecee0ad63910072ffa652c756730d9cd1d0c572a2101f9efb3daf21a2df7e458df6e051956ef5f709c8f3bfa0c48ae5655cbadc7863ebad073bd55ea20ade4a9366e796c1babe682b37fc52faf58eb21e2525daea57cde9571e6cc129f0a7fe88f23640039cfea22b34272a9373e123025be5e1668c5a1fcaf5a4a2882dab7b01da90ec6b0092bcb826525eb37e23627d751496f73399ba1a657b75cd989c2ddeb8cc874bb4b45f4ebeb713efca5b07bf27191682e16cef2a7cecba708c1da21de51c09a4ceaaa48437d3c541129c0cf940edac809c17d131f74a370d8a2c8681f927f8d1ad5e2a55bc8c8799e64bf72cdf70bf213c7850465b2f1446cd98f756c627df1179ff1fa33248665bed1c225d0d186fb8918bc0a1fdbdec8512afa417069ce2b13572d56baf8f6bb1292f1046a94eb34ebd03c602b996102e84737e9d09e5b0dcc4870f8c1a7e491b365c101d5c434cccc426116907d09efe355bf974641950b918b0a2ff5222a3527d3df8982ecb34d71e43a5bccd37b5462aad211e697e003d947f6656277667e63af6a69a8fd3c675b4170903a731f864b2d46010770151f51d61ffe35b9637bca0c14a19ace7e62fb1e22eea977c7cc7c92ea322916d9f97f5dac32454c23183d01a16995a0cab9867d2645c5500bba885125cc783de62381bb3c1080798cbd190881ac3de224d8eb48fb444ccfd39da5bad67f718056ac9d37017c5fbca38d9f806fe8490f9a28ac3ed7504ee1a9cd94b05f89e7972c7a48cc6d5e9bd2a14776a391b81e6c4ea3b5551fc60d9745b20e2f23677b9f9c5215f389db87dce3ff149e68e97818a1cd1490b3d3864aa4c84d8922adefe0aa7ddcd3726b8bcce27110cd22dca39d7bc60d8b7acdfaf73c483d0c3cbef798061a3cc164c6daf8dd779d110127dd845f764284287a12c861972c485890c82259580331d4340fff92cedf264f2853552eca8c206b91d4f1dbf27649e4a3c4feceb832d540d6211c20fefa8ec30fe0773d42bf214a5b9c9f64b5f2e4c1cf1294778ab2a248b8bafb3b43acce78fd2dc19d696d1d6cd26847d66636dbd67d390656d014214dd72fcdfed0436636c8f102e884b36c29a93b2b63ac4f79a24e4a0999e70356772acd8b45caf7557fe388b26f363bb5ef8cd33f4379fa4f1ba15a9df96989a7fa6b8ed600d426cda1f16e8791a0299b07ef8e791150d8a403d54be619b96d069ae7081cb053aa0faf038f76dc239698ed82375a85339c1b0e933661c88f2d2ae225b6e1a25edb2e009743d2dcf1ea793180604bfbb5bed4fae1b638921bbeb37", 0x1000, 0x1}, {&(0x7f0000000200)="e550cef259a745874a119ef76149ecd9569f850b045965050b40f36f3d655d37790884c409c6d311db99c6083a9dca0a997d08b069ab586bcc3030dd8555d4e6abc4efbd2cc3332732bda717670e2cf807d32d0ef4f8d1b928bcbb390625b8d713ba76951fe471fe74ef78a6b632d985fdfdb0c67d26fae7ef56e4390bdf0d347ef04b31054399c4c7ad945ce1c1d21f8217ee5e0e167c660065fec6c728beb59937", 0xa2, 0x7fffffff}, {&(0x7f00000002c0)="3b69efd3d2371c5343ed72b1757ac21f6a0d1389c5cd4e60ec5e84466d9c8b1ea4513f99986a", 0x26, 0x7}, {&(0x7f0000000300)="964d8a1fbe72dd32d0f85058dd43ce0efbcfca3b08e0e958c36d034e2e57444c95d543b104427be630a5805a6bc7296f334b6cfb7ae2f8b3a1eff8acc091cdfe431938b0033476b6122e5be5e4bb0544b47e04763f00304cb0f96928911f1340c068703fd94baf48e3de756cd8ab33fa985249a2a10bdf", 0x77, 0x2}, {&(0x7f0000000380)="0774272be99409cc01b12d59c0d6d1fab1ef09467ce39da46ff52600a5f9c374f2d30f37fe684fa262d88d71d1dcb992ccb4b0e5a1446757fbfe5dc669f75c2ace25737a62ce28c951a5", 0x4a, 0x8}, {&(0x7f00000016c0)="a3eb7dcb6234858f9145ffa5f7b05f05c2c052a32a71cc5c63e366a49e7ab00d452731fde462a8376d6566ecd121c6f6f34650e7cd1aa93ed224909e22cdadf80caa8a8529c3b02df2dbaf8ee8f35dea87fc5cdd0ca7e2ff00403c8805e8ded63d3327ea503c457fd0a49240162bd4759af1fe51a69b74d230ab0eb231164e6af073ec6d7271b41eaa1c2fb64db893de60b3cfa4f1291f0aa58addc888cf24381a448023cc2d29f9caab6c0030580f7ad41a0ff4997076adc43138c4b31736d15185c6234bdef5a55850b364c42f3600bc2ffcb5ba48fadbe8fdaac4afc09685cd6cd6", 0xe3, 0x7}]) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x0, 0x0) pipe2(&(0x7f0000000000), 0x80800) 02:37:07 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2002, 0x0, &(0x7f0000ffc000/0x2000)=nil) 02:37:08 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:08 executing program 4: fanotify_init(0x58, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) r3 = getuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000380)={{{@in=@local, @in6=@empty, 0x4e23, 0x0, 0x4e22, 0x5, 0xa, 0x80, 0xa0, 0xff, r2, r3}, {0x1, 0x4, 0x1000, 0x24ffd695, 0xffffffff, 0x8f36, 0x100000001, 0x1}, {0x40, 0x9b78, 0x427, 0xfe}, 0x8001, 0x6e6bb6, 0x2, 0x1, 0x3, 0x3}, {{@in6=@remote, 0x4d2, 0xff}, 0x2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3507, 0x3, 0x2, 0xfffffffffffffffc, 0x3, 0xffffffff, 0x100}}, 0xe8) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200, 0x0) setsockopt$packet_buf(r4, 0x107, 0x16, &(0x7f0000000040)="ee53d215fd6d0fa5772cdd4c1b0d51ed79fb3cf9f3754178fe3839bb56ce6fdc5a5cf32aac6b96491a5990d7a9097f05af129636000a8720ab5aee2c0cca365588d4f0191f5b1342b23122ed36253ac705876e71bc621fc277d89361fc77df80f55bf158ed8e9ffea6c8d7089b495e36e4c5d14f0c86ab4d6dbc44430aa816acec05d02b21d287ec64f0780dec70d154e2c503ef353e42ea6f1d8417bed6230c3598e4e630393d96aeb70860d07ab48f4d3d6ddf878ab146bc04a75508a613f9a9949beb6ed1fb8bdb066d174d266adf2219bcc4678347ee33b2b16470dc8cdf055d20f4bcbcc7b5ba37969bed46ed", 0xef) [ 118.228320][ T9814] netlink: 'syz-executor.5': attribute type 8 has an invalid length. 02:37:08 executing program 3: fanotify_init(0x58, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) r3 = getuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000380)={{{@in=@local, @in6=@empty, 0x4e23, 0x0, 0x4e22, 0x5, 0xa, 0x80, 0xa0, 0xff, r2, r3}, {0x1, 0x4, 0x1000, 0x24ffd695, 0xffffffff, 0x8f36, 0x100000001, 0x1}, {0x40, 0x9b78, 0x427, 0xfe}, 0x8001, 0x6e6bb6, 0x2, 0x1, 0x3, 0x3}, {{@in6=@remote, 0x4d2, 0xff}, 0x2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3507, 0x3, 0x2, 0xfffffffffffffffc, 0x3, 0xffffffff, 0x100}}, 0xe8) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200, 0x0) [ 118.291220][ T9814] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 02:37:08 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:08 executing program 4: fanotify_init(0x58, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) r3 = getuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000380)={{{@in=@local, @in6=@empty, 0x4e23, 0x0, 0x4e22, 0x5, 0xa, 0x80, 0xa0, 0xff, r2, r3}, {0x1, 0x4, 0x1000, 0x24ffd695, 0xffffffff, 0x8f36, 0x100000001, 0x1}, {0x40, 0x9b78, 0x427, 0xfe}, 0x8001, 0x6e6bb6, 0x2, 0x1, 0x3, 0x3}, {{@in6=@remote, 0x4d2, 0xff}, 0x2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3507, 0x3, 0x2, 0xfffffffffffffffc, 0x3, 0xffffffff, 0x100}}, 0xe8) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200, 0x0) 02:37:08 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x200040, 0x0) futimesat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={{0x77359400}, {0x0, 0x7530}}) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:08 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) 02:37:08 executing program 3: fanotify_init(0x58, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) r3 = getuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000380)={{{@in=@local, @in6=@empty, 0x4e23, 0x0, 0x4e22, 0x5, 0xa, 0x80, 0xa0, 0xff, r2, r3}, {0x1, 0x4, 0x1000, 0x24ffd695, 0xffffffff, 0x8f36, 0x100000001, 0x1}, {0x40, 0x9b78, 0x427, 0xfe}, 0x8001, 0x6e6bb6, 0x2, 0x1, 0x3, 0x3}, {{@in6=@remote, 0x4d2, 0xff}, 0x2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3507, 0x3, 0x2, 0xfffffffffffffffc, 0x3, 0xffffffff, 0x100}}, 0xe8) 02:37:08 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:37:08 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x11ac, &(0x7f0000ffc000/0x2000)=nil) [ 118.642770][ T9842] netlink: 'syz-executor.5': attribute type 8 has an invalid length. [ 118.668688][ T9842] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 02:37:08 executing program 1: fanotify_init(0x58, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) r3 = getuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000380)={{{@in=@local, @in6=@empty, 0x4e23, 0x0, 0x4e22, 0x5, 0xa, 0x80, 0xa0, 0xff, r2, r3}, {0x1, 0x4, 0x1000, 0x24ffd695, 0xffffffff, 0x8f36, 0x100000001, 0x1}, {0x40, 0x9b78, 0x427, 0xfe}, 0x8001, 0x6e6bb6, 0x2, 0x1, 0x3, 0x3}, {{@in6=@remote, 0x4d2, 0xff}, 0x2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3507, 0x3, 0x2, 0xfffffffffffffffc, 0x3, 0xffffffff, 0x100}}, 0xe8) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200, 0x0) setsockopt$packet_buf(r4, 0x107, 0x16, &(0x7f0000000040)="ee53d215fd6d0fa5772cdd4c1b0d51ed79fb3cf9f3754178fe3839bb56ce6fdc5a5cf32aac6b96491a5990d7a9097f05af129636000a8720ab5aee2c0cca365588d4f0191f5b1342b23122ed36253ac705876e71bc621fc277d89361fc77df80f55bf158ed8e9ffea6c8d7089b495e36e4c5d14f0c86ab4d6dbc44430aa816acec05d02b21d287ec64f0780dec70d154e2c503ef353e42ea6f1d8417bed6230c3598e4e630393d96aeb70860d07ab48f4d3d6ddf878ab146bc04a75508a613f9a9949beb6ed1fb8bdb066d174d266adf2219bcc4678347ee33b2b16470dc8cdf055d20f4bcbcc7b5ba37969bed46ed", 0xef) 02:37:08 executing program 4: fanotify_init(0x58, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) r3 = getuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000380)={{{@in=@local, @in6=@empty, 0x4e23, 0x0, 0x4e22, 0x5, 0xa, 0x80, 0xa0, 0xff, r2, r3}, {0x1, 0x4, 0x1000, 0x24ffd695, 0xffffffff, 0x8f36, 0x100000001, 0x1}, {0x40, 0x9b78, 0x427, 0xfe}, 0x8001, 0x6e6bb6, 0x2, 0x1, 0x3, 0x3}, {{@in6=@remote, 0x4d2, 0xff}, 0x2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3507, 0x3, 0x2, 0xfffffffffffffffc, 0x3, 0xffffffff, 0x100}}, 0xe8) 02:37:08 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x200040, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:08 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0xac13, &(0x7f0000ffc000/0x2000)=nil) 02:37:08 executing program 3: fanotify_init(0x58, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) getuid() 02:37:08 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x2000000, &(0x7f0000ffc000/0x2000)=nil) 02:37:08 executing program 4: fanotify_init(0x58, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) getuid() [ 119.003293][ T9860] netlink: 'syz-executor.5': attribute type 8 has an invalid length. [ 119.030030][ T9860] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 02:37:08 executing program 3: fanotify_init(0x58, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:08 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:08 executing program 4: fanotify_init(0x58, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) [ 119.218126][ T9877] netlink: 'syz-executor.5': attribute type 8 has an invalid length. [ 119.259034][ T9877] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 02:37:09 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:37:09 executing program 1: fanotify_init(0x58, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) r3 = getuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000380)={{{@in=@local, @in6=@empty, 0x4e23, 0x0, 0x4e22, 0x5, 0xa, 0x80, 0xa0, 0xff, r2, r3}, {0x1, 0x4, 0x1000, 0x24ffd695, 0xffffffff, 0x8f36, 0x100000001, 0x1}, {0x40, 0x9b78, 0x427, 0xfe}, 0x8001, 0x6e6bb6, 0x2, 0x1, 0x3, 0x3}, {{@in6=@remote, 0x4d2, 0xff}, 0x2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3507, 0x3, 0x2, 0xfffffffffffffffc, 0x3, 0xffffffff, 0x100}}, 0xe8) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200, 0x0) setsockopt$packet_buf(r4, 0x107, 0x16, &(0x7f0000000040)="ee53d215fd6d0fa5772cdd4c1b0d51ed79fb3cf9f3754178fe3839bb56ce6fdc5a5cf32aac6b96491a5990d7a9097f05af129636000a8720ab5aee2c0cca365588d4f0191f5b1342b23122ed36253ac705876e71bc621fc277d89361fc77df80f55bf158ed8e9ffea6c8d7089b495e36e4c5d14f0c86ab4d6dbc44430aa816acec05d02b21d287ec64f0780dec70d154e2c503ef353e42ea6f1d8417bed6230c3598e4e630393d96aeb70860d07ab48f4d3d6ddf878ab146bc04a75508a613f9a9949beb6ed1fb8bdb066d174d266adf2219bcc4678347ee33b2b16470dc8cdf055d20f4bcbcc7b5ba37969bed46ed", 0xef) 02:37:09 executing program 3: fanotify_init(0x58, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:09 executing program 4: fanotify_init(0x58, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) 02:37:09 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0xac110000, &(0x7f0000ffc000/0x2000)=nil) 02:37:09 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:09 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x200000000000000, &(0x7f0000ffc000/0x2000)=nil) 02:37:09 executing program 3: fanotify_init(0x58, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:09 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:09 executing program 4: fanotify_init(0x58, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:09 executing program 1: fanotify_init(0x58, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) r3 = getuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000380)={{{@in=@local, @in6=@empty, 0x4e23, 0x0, 0x4e22, 0x5, 0xa, 0x80, 0xa0, 0xff, r2, r3}, {0x1, 0x4, 0x1000, 0x24ffd695, 0xffffffff, 0x8f36, 0x100000001, 0x1}, {0x40, 0x9b78, 0x427, 0xfe}, 0x8001, 0x6e6bb6, 0x2, 0x1, 0x3, 0x3}, {{@in6=@remote, 0x4d2, 0xff}, 0x2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3507, 0x3, 0x2, 0xfffffffffffffffc, 0x3, 0xffffffff, 0x100}}, 0xe8) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200, 0x0) setsockopt$packet_buf(r4, 0x107, 0x16, &(0x7f0000000040)="ee53d215fd6d0fa5772cdd4c1b0d51ed79fb3cf9f3754178fe3839bb56ce6fdc5a5cf32aac6b96491a5990d7a9097f05af129636000a8720ab5aee2c0cca365588d4f0191f5b1342b23122ed36253ac705876e71bc621fc277d89361fc77df80f55bf158ed8e9ffea6c8d7089b495e36e4c5d14f0c86ab4d6dbc44430aa816acec05d02b21d287ec64f0780dec70d154e2c503ef353e42ea6f1d8417bed6230c3598e4e630393d96aeb70860d07ab48f4d3d6ddf878ab146bc04a75508a613f9a9949beb6ed1fb8bdb066d174d266adf2219bcc4678347ee33b2b16470dc8cdf055d20f4bcbcc7b5ba37969bed46ed", 0xef) 02:37:09 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0xac11000000000000, &(0x7f0000ffc000/0x2000)=nil) 02:37:10 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:10 executing program 3: fanotify_init(0x58, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:10 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:37:10 executing program 4: fanotify_init(0x58, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:10 executing program 1: fanotify_init(0x58, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) r3 = getuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000380)={{{@in=@local, @in6=@empty, 0x4e23, 0x0, 0x4e22, 0x5, 0xa, 0x80, 0xa0, 0xff, r2, r3}, {0x1, 0x4, 0x1000, 0x24ffd695, 0xffffffff, 0x8f36, 0x100000001, 0x1}, {0x40, 0x9b78, 0x427, 0xfe}, 0x8001, 0x6e6bb6, 0x2, 0x1, 0x3, 0x3}, {{@in6=@remote, 0x4d2, 0xff}, 0x2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3507, 0x3, 0x2, 0xfffffffffffffffc, 0x3, 0xffffffff, 0x100}}, 0xe8) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200, 0x0) 02:37:10 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x40) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000040)=0x4000000) 02:37:10 executing program 5: r0 = socket$inet(0x10, 0x0, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:10 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) 02:37:10 executing program 4: fanotify_init(0x58, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:10 executing program 1: fanotify_init(0x58, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) r3 = getuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000380)={{{@in=@local, @in6=@empty, 0x4e23, 0x0, 0x4e22, 0x5, 0xa, 0x80, 0xa0, 0xff, r2, r3}, {0x1, 0x4, 0x1000, 0x24ffd695, 0xffffffff, 0x8f36, 0x100000001, 0x1}, {0x40, 0x9b78, 0x427, 0xfe}, 0x8001, 0x6e6bb6, 0x2, 0x1, 0x3, 0x3}, {{@in6=@remote, 0x4d2, 0xff}, 0x2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3507, 0x3, 0x2, 0xfffffffffffffffc, 0x3, 0xffffffff, 0x100}}, 0xe8) 02:37:10 executing program 3: fanotify_init(0x58, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:10 executing program 5: r0 = socket$inet(0x10, 0x0, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:10 executing program 4: fanotify_init(0x58, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:10 executing program 1: fanotify_init(0x58, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) getuid() 02:37:11 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 02:37:11 executing program 3: fanotify_init(0x58, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:11 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) r0 = open(&(0x7f0000000000)='./file0\x00', 0x214000, 0x40) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000240)={0x1db2193b, {{0x2, 0x4e23, @remote}}, 0x1, 0x4, [{{0x2, 0x4e20, @loopback}}, {{0x2, 0x4e20, @local}}, {{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x4e22, @rand_addr=0x7e9}}]}, 0x290) setxattr$security_smack_transmute(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x3) 02:37:11 executing program 5: r0 = socket$inet(0x10, 0x0, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:11 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:11 executing program 1: fanotify_init(0x58, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:11 executing program 2: prlimit64(0x0, 0xb, &(0x7f0000000140), 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x41001}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000a300", @ANYRES16=r1, @ANYBLOB="01072bbd7000fbdbdf2501000000000000000c4100000014001462726f6164636173742d6c696e6b0000"], 0x30}, 0x1, 0x0, 0x0, 0x200000c0}, 0x4000000) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000040)=0x4, 0x4) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) setsockopt$inet6_dccp_buf(r0, 0x21, 0xcd, &(0x7f0000000080)="d395ae947fb07f440948e2c1f1e0a5c0946e7244602ee9fd2c99d7b406a2a10663a5f657d96e51be646bb2404389acd3849be20c37533d0eed2933728652d678ab5da9cebf0cce85ad55e4e448aa6f9abddd4c1ec5aeb007bac9a0763e4f35384bfa340b0f7c3f49a76127e94ce51f212bf8396efe8610a0f7bf3ac07d67afca3d68caaf", 0x84) 02:37:11 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:11 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:11 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:11 executing program 1: fanotify_init(0x58, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) 02:37:11 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:12 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 02:37:12 executing program 1: fanotify_init(0x58, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:12 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x1, 0x0) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f0000000240)={0x1c19, 0x5}) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000280)=0xfffffffffffffff8, &(0x7f0000000100)=0x4) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000180)=0x0) prlimit64(r1, 0x20000000002, &(0x7f0000000140)={0x72df}, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400401, 0x0) ioctl$SIOCX25SCAUSEDIAG(r2, 0x89ec, &(0x7f0000000040)={0x2, 0x7}) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f00000001c0)={0x7, 0x7fff, [{0x10fc0cd3, 0x0, 0x474e1dcb}, {0x1ff, 0x0, 0x200}, {0x100000000, 0x0, 0x7}, {0xfff, 0x0, 0x8}, {0x8, 0x0, 0x100000001}, {0x101, 0x0, 0x4}, {0xa59, 0x0, 0x6}]}) 02:37:12 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:12 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:12 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:12 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:12 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:12 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:12 executing program 1: fanotify_init(0x58, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:12 executing program 2: r0 = getpgid(0xffffffffffffffff) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x40000, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000080)={0x0, 0xffffffff80000001}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000100)={r2, 0x8}, &(0x7f0000000140)=0x8) prlimit64(r0, 0x20000000002, &(0x7f0000000000)={0x0, 0x2}, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 02:37:12 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:12 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 02:37:12 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:12 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:12 executing program 1: fanotify_init(0x58, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:12 executing program 2: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x800000000000, &(0x7f0000ffc000/0x2000)=nil) r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x400, 0x20000) getsockname$llc(r0, &(0x7f0000000140)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000180)=0x10) dup(r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000000)={0x1d, @local, 0x4e23, 0x4, 'rr\x00', 0x2, 0x10000, 0xa}, 0x2c) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) 02:37:12 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:13 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7, 0x80000) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0xffffffffffffffff) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 02:37:13 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:13 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:13 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:13 executing program 1: fanotify_init(0x58, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:13 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0xffffffffffffffff, &(0x7f0000ffc000/0x3000)=nil) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) write$P9_RREADDIR(r0, &(0x7f0000000000)={0x87, 0x29, 0x2, {0x800, [{{0x4, 0x4, 0x4}, 0x0, 0x40, 0x7, './file0'}, {{0x4, 0x0, 0x3}, 0x5, 0x0, 0x7, './file0'}, {{0x13, 0x1, 0x4}, 0x4, 0x681, 0x7, './file0'}, {{0x20, 0x0, 0x2}, 0x2, 0x5, 0x7, './file0'}]}}, 0x87) readlinkat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=""/203, 0xcb) 02:37:13 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:13 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:13 executing program 0 (fault-call:3 fault-nth:0): openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:13 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:13 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:13 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) uname(&(0x7f0000000240)=""/4096) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x105700, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@broadcast, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000001c0)=0xe8) r2 = getegid() lchown(&(0x7f0000000080)='./file0\x00', r1, r2) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r0, 0x4010ae74, &(0x7f0000000040)={0x4, 0x7ff, 0x1}) ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0x1ff) 02:37:13 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:13 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:14 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:14 executing program 2: r0 = getpgid(0x0) prlimit64(r0, 0x20000000002, &(0x7f0000000200)={0xffffffffffffffff}, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 02:37:14 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:14 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:14 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:14 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:14 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:14 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1f, 0x2, &(0x7f0000000000)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xffffffff}], &(0x7f0000000040)='GPL\x00', 0x10000, 0x88, &(0x7f0000000080)=""/136, 0x41f00, 0x2, [], 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0x5, 0x0, 0xfffffffffffffffc}, 0x10}, 0x70) fdatasync(r0) prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 02:37:14 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x6}, 0x0, 0x0, 0x0, 0x0) 02:37:14 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:14 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:14 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:14 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0xc0ef413aac19fa1f, &(0x7f0000ffb000/0x2000)=nil) 02:37:14 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:14 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x600}, 0x0, 0x0, 0x0, 0x0) 02:37:14 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:14 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:14 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:14 executing program 2: pipe2(&(0x7f0000000280)={0xffffffffffffffff}, 0x800) move_mount(r0, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x30) prlimit64(0x0, 0x13, &(0x7f0000000200)={0xffff}, 0x0) sendto$x25(r0, &(0x7f0000000100)="cefcb33af71caeed98543acf2fcfaaa7590c6c1f85a372d5729d280efc4859ff39f78f0a09318af7474ae21633e230045eee67fb368eafcf80d473c27989dfa37c7bafc73fdf29c703b685cf1fc930b845b63ef58d0f456b2d698dca917f9cb35f04e85081dc84b6b3f0ee17912f60f672aac44eac5af9b5e72c4d96133e67b7b3e8a0c65bf5fb2309e5c8a1e5d30d0c88a62ce249f6975201aa0babce146976ec9221871a674b0b83bf7f99296ad0374023a685e2b3a0ac82d684f49e5c320d0aadb5f5f8fc2b3aba211060af5383f888a983cd91a9fb3036d1a6", 0xdb, 0xb709daf2c529bf39, &(0x7f0000000240)={0x9, @null=' \x00'}, 0x12) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) rt_sigprocmask(0x3, &(0x7f00000000c0)={0xa8f6}, 0x0, 0x8) 02:37:14 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:14 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x6000000}, 0x0, 0x0, 0x0, 0x0) 02:37:14 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:14 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:14 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) pause() r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000040)=""/115, &(0x7f00000000c0)=0x73) 02:37:14 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:15 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x1000000000000}, 0x0, 0x0, 0x0, 0x0) 02:37:15 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:15 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:15 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:15 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x5, 0x600040) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) prlimit64(r1, 0x20000000002, &(0x7f0000000200)={0x3}, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x400) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 02:37:15 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:15 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x600000000000000}, 0x0, 0x0, 0x0, 0x0) 02:37:15 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:15 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:15 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:15 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x6, 0x101000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000100)={'mangle\x00', 0x4, [{}, {}, {}, {}]}, 0x68) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 02:37:15 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:15 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:15 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x0, 0x6}, 0x0, 0x0, 0x0, 0x0) 02:37:15 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:15 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:15 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:15 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1, 0x4f38badef3d54f47) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x4e23, @rand_addr=0x5a90}, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @loopback}, 0x101, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)='sr\x00\x00\x00\x00\x00\x00 \x00', 0x2bc0, 0x0, 0x2}) sendmsg$kcm(r0, &(0x7f0000001340)={&(0x7f0000000100)=@pppoe={0x18, 0x0, {0x3, @random="39a252fd2d50", 'nlmon0\x00'}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000180)="f034d82d8f233a828f30e35b1ee2076734450657ac03d2453eb9f53cc520ce9f975be70678001c75a103201144277ab7c6a579955e498aa4baba6645002219c0c99209927109f5506dad744b0cc21ed82bcc1fa829622d64dcf65c4018e4af6ea86b7a7c237fecc95e9a8edaec30ba12c163e31d0e", 0x75}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x10b0}, 0x4000000) syz_open_dev$cec(&(0x7f0000001380)='/dev/cec#\x00', 0x1, 0x2) 02:37:15 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:15 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x0, 0x600}, 0x0, 0x0, 0x0, 0x0) 02:37:15 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:15 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:15 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:15 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xb4, r1, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x401}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e23}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffffffffb20b}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x40}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x100}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xe1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x401}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0xb4}, 0x1, 0x0, 0x0, 0x1}, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) ioctl$RTC_WIE_OFF(r0, 0x7010) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x200, 0x4002) ioctl$BLKRAGET(r2, 0x1263, &(0x7f0000000040)) 02:37:15 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:16 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x0, 0x6000000}, 0x0, 0x0, 0x0, 0x0) 02:37:16 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:16 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:16 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000, 0x400000, &(0x7f0000ff9000/0x2000)=nil) 02:37:16 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:16 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:16 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:16 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:16 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x0, 0x1000000000000}, 0x0, 0x0, 0x0, 0x0) 02:37:16 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:16 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:16 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x7fff, 0x600800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000040)={0x5, 0xbf7b, 0x6, 0x2, 0x2}) lsetxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:dhcp_etc_t:s0\x00', 0x20, 0x3) prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) ioctl$CAPI_NCCI_GETUNIT(r0, 0x80044327, &(0x7f0000000080)=0x5) 02:37:16 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:16 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:16 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:16 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:16 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f00000000c0)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}) prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) r1 = accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000000), 0x800) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='vegas\x00', 0x6) 02:37:16 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x0, 0x600000000000000}, 0x0, 0x0, 0x0, 0x0) 02:37:16 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:16 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:16 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:16 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:16 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) r0 = dup(0xffffffffffffffff) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f00000000c0)={0x9166, 0xfffffffffffffffe, 0x7f, 0x7, 0xc3ef}) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) 02:37:17 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x0, 0x0, 0x6}, 0x0, 0x0, 0x0, 0x0) 02:37:17 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:17 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:17 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:17 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:17 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000100), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="e4c0fe89623f66aa83912245282fada5cdca1e53cc7ca04e892cac388e8cf2921a1f75660bd80c628a641f01558c2daffe893768ca7abcc68acb99471f216770e50d05e475c69640332f9502d169522e29b3cb36216bdb2ce93b5d58f382e809023647e831611957621a58b683c85127c8f4dafe88e2fac262f11450a028f7", 0x7f, 0xfffffffffffffff8) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vfio/vfio\x00', 0x200, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) keyctl$update(0x2, r0, 0x0, 0x0) 02:37:17 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x0, 0x0, 0x600}, 0x0, 0x0, 0x0, 0x0) 02:37:17 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:17 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:17 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:17 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:17 executing program 2: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 02:37:17 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:17 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:17 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x0, 0x0, 0x6000000}, 0x0, 0x0, 0x0, 0x0) 02:37:17 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:17 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:17 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) prlimit64(r0, 0xf, &(0x7f0000000080)={0x2}, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 02:37:17 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:17 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0x0, 0x0) 02:37:17 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:17 executing program 2: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) r1 = getpgid(r0) prctl$PR_GET_CHILD_SUBREAPER(0x25) prlimit64(r1, 0x20000000002, &(0x7f0000000040), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 02:37:17 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:18 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:18 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:18 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x0, 0x0, 0x600000000000000}, 0x0, 0x0, 0x0, 0x0) 02:37:18 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:18 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:18 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 02:37:18 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:18 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:18 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0x0, 0x0) 02:37:18 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:18 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:18 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x0, 0x0, 0x0, 0x600}, 0x0, 0x0, 0x0, 0x0) 02:37:18 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:18 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:18 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x10) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0xc0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='dummy0\x00', 0x10) bind$rds(r0, &(0x7f0000000100)={0x2, 0x4e21, @rand_addr=0x5}, 0x10) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000, 0x2, &(0x7f0000ffd000/0x3000)=nil) 02:37:18 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:18 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x0, 0x0, 0x0, 0x6000000}, 0x0, 0x0, 0x0, 0x0) 02:37:18 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:18 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:18 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) r0 = dup(0xffffffffffffff9c) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000000)={&(0x7f0000ffd000/0x3000)=nil, 0x9, 0x3, 0x82, &(0x7f0000ffd000/0x1000)=nil, 0x9}) 02:37:18 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:18 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:18 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0x0, 0x0) 02:37:18 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:19 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x28000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000100)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, &(0x7f0000000240)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000002f40)={'veth0_to_bridge\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000031c0)={'ipddp0\x00', 0x0}) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000003200)={@mcast2, 0x0}, &(0x7f0000003240)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003280)={{{@in=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000003380)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000048c0)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in6}}, &(0x7f00000049c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000004c40)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4800}, 0xc, &(0x7f0000004c00)={&(0x7f0000004a00)={0x1d8, r1, 0x400, 0x70bd2a, 0x25dfdbff, {}, [{{0x8, 0x1, r2}, {0xf4, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r4}, {0xc0, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r5}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}]}}]}, 0x1d8}}, 0x8040) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x1, {0x100000000, 0x23, 0x12, 0x15, 0xa, 0x39a, 0x4, 0x85}}) 02:37:19 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:19 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:19 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:19 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:19 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:19 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x0, 0x0, 0x0, 0x600000000000000}, 0x0, 0x0, 0x0, 0x0) 02:37:19 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:19 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:19 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x977, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x608}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)={0x300, r1, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0xd8, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x2, @local, 0x115b600}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x2, @ipv4={[], [], @remote}, 0x3547}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffff7}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'tunl0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6e88}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa8d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'caif0\x00'}}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8001}]}, @TIPC_NLA_BEARER={0x54, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x7, @local}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x5, @mcast2, 0x78b}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffffffffffffffff}]}, @TIPC_NLA_MEDIA={0xa8, 0x5, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x401}]}, @TIPC_NLA_LINK={0xb4, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f22}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x300}, 0x1, 0x0, 0x0, 0x4800}, 0x8000) 02:37:19 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:19 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0x0, 0x0) 02:37:19 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:19 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:19 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:19 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f00000000c0), 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0, 0x0) ioctl$KVM_NMI(r0, 0xae9a) ioctl$KDSETMODE(r0, 0x4b3a, 0x6) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) ioctl$int_in(r0, 0x0, &(0x7f0000000080)=0x8) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, 0x1000, 0x1}) ioctl$SIOCAX25GETINFO(r0, 0x89ed, &(0x7f0000000100)) 02:37:19 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:19 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:19 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x0, 0x0, 0x0, 0x0, 0x600}, 0x0, 0x0, 0x0, 0x0) 02:37:19 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x20000, 0x2040) ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0286404, &(0x7f0000000040)={&(0x7f0000ff9000/0x4000)=nil, 0x8, 0x1, 0x30, &(0x7f0000ff9000/0x4000)=nil, 0x180000}) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)={0x3e8, r1, 0x0, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x177}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA={0x4c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xef5b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xdb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}]}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_LINK={0x70, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x83}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_LINK={0x128, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}, @TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}]}, @TIPC_NLA_LINK={0x78, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5ff7c563}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}]}]}, @TIPC_NLA_LINK={0x110, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x54c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x221b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xcf}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb6a}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}]}]}, 0x3e8}, 0x1, 0x0, 0x0, 0x4}, 0x40) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0x8008ae9d, &(0x7f0000000640)=""/134) 02:37:19 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:19 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:19 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:19 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:20 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:20 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:20 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) r0 = dup(0xffffffffffffffff) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000000)=0x1, 0x4) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 02:37:20 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x0, 0x0, 0x0, 0x0, 0x6000000}, 0x0, 0x0, 0x0, 0x0) 02:37:20 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:20 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:20 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:20 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:20 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000000)={0x3, 0xffffffffffffff9c, 0x1}) pwritev(r0, &(0x7f0000000100)=[{&(0x7f0000000040)="73adfa457f65bd73c650570e81042f2fc627e304e295321f2f87bbc0b046233f03d066f461acfb2318f0764ea89a13ca27cf6f1dec", 0x35}, {&(0x7f0000000080)="cf3ce15ebb44c5700d5411e2a55b97fef212554fc4beaa2596affc0c9af575a8f2d5f52c16c5a56e985d5a191bc23c96beda654501a84b956e90da5e52e5f9666450a0", 0x43}], 0x2, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 02:37:20 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0x0, 0x0) 02:37:20 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:20 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:20 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:20 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x42, 0x0) setsockopt$TIPC_MCAST_REPLICAST(r0, 0x10f, 0x86) 02:37:20 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:20 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:20 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x0, 0x0, 0x0, 0x0, 0x600000000000000}, 0x0, 0x0, 0x0, 0x0) 02:37:20 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:20 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:20 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:20 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x84800) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000100)={0x3, 0x2, 0x8000, 0x2, 0x8479, 0x9, 0x80, 0x7f, 0x0}, &(0x7f0000000140)=0x20) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000001880)={r1, 0x80}, &(0x7f00000001c0)=0x8) prlimit64(0x0, 0x20000000002, &(0x7f0000000200)={0x0, 0x40000000000000}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f0000000080)={0x0, 0x37, &(0x7f0000000040)="e8c782aa1bc64658e38787d48c55a14f617b8e95833fa85263d243a9fac6659da31ba485032aa0757535bc52b7db6380e216000239a29e"}) sendmmsg$inet_sctp(r3, &(0x7f0000001700)=[{&(0x7f0000000240)=@in6={0xa, 0x4e22, 0x100000001, @rand_addr="717fb862897e88a4bcafb10fa5443746", 0x5}, 0x1c, &(0x7f00000007c0)=[{&(0x7f0000000280)="fbddbba72fd62fae3395046379815b9dc3faa60330cd8baa8bc80bc98181fe7ee0cc050f86508c9bd1c6f0cc33661459b5d68b80c08201ffcd97161fd8e84706cd7768383421b8b394bfc499eff99a24e83ea1766d9104d833d51781a0260c50b8a0084a0c906d6cbf13e954d2ac891d17f5a4f25b75fd5cdf0268e9d43f09b8aad9c490d01704c0cb85b93ef9c2c1f4a19b199070eef9d2b5ee79353188bced48af1d6983c5c631d15375b00b0012c15dc9", 0xb2}, {&(0x7f0000000340)="e2677de72ef8a1295c163c319e4fb24fbc2742b1794a15f65a3d00cc3ff2ac5fad5ed2c19ddf2616888a9c198e939ad4e0c954b578a115e70d0d7645580c818c6cd69fd8731a0e85a2a09432fe5aaab90f5e162d8cb1e870", 0x58}, {&(0x7f00000003c0)="935a99ff6d9fe483c0153a5ffb77736df212be64ae56633ba69862003f2a74d4730ce3cab5f5e9e9f5ebe2b208c925efbefbd733cb55f092d92beafc183e4c98a703e8aae099e94bdd155259f7e20bddf96102b03d30660f5b5fd580da8b8a19f60845544023cdff119a9d4a00dca160c2e0db16bd52b0680e70afca21bc078c63c5a00be8b39e8b9557da5a8d5a3d4f8924dac2e2d4c13d7bb0b4dfd3d5a361734cdabddef9fa8284882fd931ee1713c4976cb3c1d2cd86cb493e12458adfc939877480240cc90165d45247de250facf5", 0xd1}, {&(0x7f00000004c0)="acab9ef51efd91c601ba76c6ef00e086ac574ebc6913c42d1e0f302e7cb00825f87f38f2ccfa6a574e4f160770dcdc992cceab053f57f892fe322ff2688b6c10e992673ce3826e4f234738f37f89b76f67db28d7fa274d50df2eb50c31af75119c846768a25775603bad85d5a1cda01b6a11135f57348228afadf1487562ab178010481ce0e278ccda5280ced79f6532", 0x90}, {&(0x7f0000000580)="f2d766285702d80a6ae5fb17cca4cdbe9fc60166d0b0153556364d609c99bf517e00249087b369c2d503cbfdd42da067324a59f1ca53287f268e2a9b4853e7acf41393325506df255b017c96e74e4c65ba966ddd0185bb0b2e08688ac828be2fad89333213514f438aa3fe18449728cd94871e134b099f19b1470fc4527fa67d54e39833c24fbea8bf760d69634b7289200fdec3d02e31d08ef89026610860fc1f20c49b94b3648c48a6bf8f2b5553105c7f8a6defed3b32fb325a37cbbe486429d9c2a884d8aee4518112248c50302fde509b3c355deca4fa65", 0xda}, {&(0x7f0000000680)='~', 0x1}, {&(0x7f00000006c0)="dcbc66fa03db42b7d3fb78592bc82740eb091cf3aa317e85a20e6119b7659409311b4274434ebf73e196031389e105818a3a67688177ad7e77c9c5ccc28eb7b3", 0x40}, {&(0x7f0000000700)="6f9ad504f4520e802cf18a512ba9eb20a9c6000169d8ec76de6e16ec44489db2e8ad5f05788890dbd979baf60854e9140ce190f81c6347d0d70a1c4c775433b8dedd261bcd0fe47f471ad9273d1e39fe54cf59dba64f440900f836b462ec6179a1a646efa2d522d1a72640e3f90598770697f21f1b0b50ca485c46f50da83fb8f5be454595256443e733d6e6c7685ed6e11f932ec5d01b40b3381f557631d1d14b14fce7282f14ebe3775c3d82266a89aa3f4f74", 0xb4}], 0x8, &(0x7f0000000840)=[@dstaddrv6={0x20, 0x84, 0x8, @mcast1}, @sndrcv={0x30, 0x84, 0x1, {0x100000001, 0x3, 0xc, 0x7fffffff, 0x5ec, 0x2, 0x8001, 0x3f, r2}}, @dstaddrv6={0x20, 0x84, 0x8, @mcast2}, @sndinfo={0x20, 0x84, 0x2, {0xffffffff, 0x200, 0x7, 0x6, r1}}, @init={0x18, 0x84, 0x0, {0x5, 0x80000001, 0x4, 0xff}}, @authinfo={0x18, 0x84, 0x6, {0x5}}, @sndrcv={0x30, 0x84, 0x1, {0x3ff, 0xc9, 0x0, 0x20, 0x7c6, 0x80, 0xfff, 0x30, r2}}], 0xf0, 0x8000}, {&(0x7f0000000940)=@in6={0xa, 0x4e20, 0x3ff, @ipv4={[], [], @rand_addr=0x2b7d}, 0x2}, 0x1c, &(0x7f0000000a00)=[{&(0x7f0000000980)="7dcc716b258ed335f78c37ee7ee6bd4e2097a1381995c2008b7b86403db0ca744efdb02c6ca663836ffb9b712830621dd2c3e860d8dc05b4dc95451ddaeb2dad2f38f3666b8af4b1211b5a2dd868e70eebe0bbc5e4436dbefd77b5e6f78d151d12b1d1ce6c897dd585b6d6dcc7", 0x6d}], 0x1, &(0x7f0000000a40)=[@init={0x18, 0x84, 0x0, {0xfff, 0xfffffffffffffff9, 0x9, 0xb340}}, @init={0x18, 0x84, 0x0, {0x0, 0x5, 0x7ff, 0x6}}], 0x30, 0x80}, {&(0x7f0000000a80)=@in6={0xa, 0x4e23, 0x8001, @local, 0xff}, 0x1c, &(0x7f0000000cc0)=[{&(0x7f0000000ac0)="b17c1fbe01d63ceb852d9dba5c83c064e86934addbfba010731c004c3ba7d63709d5e5c28e926a71a7dd47d5035c7b46bb2e2a9f3ef807cf609c9b72a358970114825887b2befc07cbe82c874d8da4b19d6ec6d92cce9ef50ea84ae5e085db8ae0a043cf0eded9b16768784235e13a55bf33641e63cc9883337df74745cea0a1a8faef41820c096c16cde8580e9067a03e0ee6c421dbcf8352099b8cac6dedb7ba9261c5cb87031a3cab04222a387b673c2faaa43dd2aa4377f5b802426f453ee38db7fb5a489b31a4b3d8130a4daf651ec251e785", 0xd5}, {&(0x7f0000000bc0)='k.,R', 0x4}, {&(0x7f0000000c00)="6ee6c3de649389732025eaf009f489b6821f644153774d5cdc5780866e0e3a67a41b2b274425ae126c2e36de732b82cddeba4d96459826bd4dfba47948d8fefb4c0453cff02a1d3a9ca97887effef4a77e10941b7bf91171975e824099fffab68746c41e47bfe99ec9c28a87d9788d01f72e2852af3ffb35c88bcfdf1b3e805acc7107fb01075babb7e2d101ed398d53490720", 0x93}], 0x3, &(0x7f0000000d00)=[@dstaddrv6={0x20, 0x84, 0x8, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x4}}, @init={0x18, 0x84, 0x0, {0x20, 0xc3f1, 0x5, 0x9}}, @dstaddrv4={0x18, 0x84, 0x7, @loopback}, @init={0x18, 0x84, 0x0, {0x80000001, 0xffffffffffffff7f, 0x4, 0x2}}], 0x80, 0x41}, {&(0x7f0000000d80)=@in6={0xa, 0x4e21, 0xd13a, @loopback, 0x6}, 0x1c, &(0x7f0000001300)=[{&(0x7f0000000dc0)="058cb418be2a44aa3c9d3d15336db8f8d19ab646ecf3aec813", 0x19}, {&(0x7f0000000e00)="a17454dcebce3376b3872e37055cce68955f0dad25ec0fece4bf1d7bf7f2411a873784900921d6ac5fcfbee38ed6ec9d6d7d0096d6820d59207935802997e490f8e18bbccfce230d8fff42", 0x4b}, {&(0x7f0000000e80)="4eb62afb8df54cda150e69cecef940d1e9a696673f030edf3c3fbe63b3734de753857ce6baf6288a3b9effe54235a6b5d6fca76b1ed3e31e3d940fc55d1fece245bb257a65ce7450e07a8637afe23b63da5039b07f4f8e2739564a9f0b85a8f15e6bd1b7b764e6b652175d282d904544087f898367443fa310ae3b6c45", 0x7d}, {&(0x7f0000000f00)="1f255ccb100334b6fa7b2080832a529bd02707355325eaeba72e0666883ac99738f467e4302c025e9b45805e68539101be18e4b7c0c2935e462433a3ad4029d867cf4ebcb000e10ef86cf21bc35ee2aa9aa112d8d70266282e7f3122a3aa33f24d89b6b8dc38691d2b245bc4ee8135755c2a1d72e82fc228", 0x78}, {&(0x7f0000000f80)="8e5ff95f8d2b6d04190775add9c3adc4111ea7a571f59b1206520d7cbae950760eeaf92084f697b8029676e2810bbe0c9c1d010a937f7943c9e15f7071623a994bea960497dff4374415975ad31d313b8ed5f13b67db572dbdd9e70f0d4fdb300e7d73018322c4ef037209d7689fc75742cd34d7573059a09943874401f4d272299a348c464b642b406638462cdd9d02857366d05b3328e34ef88be052c1eb6fd49147c6aaccb145bb2908bbe99e442508b6f2e7766be8dfe39e5f308c1612d6a2ddd32e42eb4d7181ac7ff2bdbe2889ad925651705b8077e97724c57af42330e8093fcb3d194cc1bbcb7c64", 0xec}, {&(0x7f0000001080)="5f72fcf9601b50c5a415d2e1c41e35ea4ea06f2a1e728b9098d66bbac9786ea9d39a577395a7d9cde158f6f244e1507634f348240374da8afb20b378fa8ca7cd109389e1ec619f7ecf3d939f97b82e6b8ecb80abd7f730edf7435fb8e17dca83b3cfcc142ee927d8d5c201e5667ee1ac307ef3f46f8a1e0652bab225c1251cb8a9fe07bd44eb2ab92c2f0780e914a75d2a0bb61b1c2bdcad405b906c1180a0f4b8b45f41ea6343f3cf4a134a5783c1ed635fa55f49161758a2481d6ddbc0cc48221eb7ccaba1fb0662c40bb72ff53fe9e4318e5ee445e23ca09748841682a4743b0333221737c175d1d8c5ec22026bfa95cfc6c4", 0xf4}, {&(0x7f0000001180)="b84c87edacdbc0f614a3b3135bdb9b64218215e0b6670bf3945be7adc690980fb8a9d442d43f5f63b549b6f3012bdd8b6f475998ff180f9da24c80db804bfd7628899258d7013c4d4292f7512acf9e15ed62d32319a0280bd8efb33ebcd439eb5636ab76fcbcc3dd8a307c4db52134224d5fdf7222e09e5db71113c82ba259562bf2dc38afbf292ba5bd4f2598666425310da4c82edf", 0x96}, {&(0x7f0000001240)="c693f828423b82e2bcc2a5e902f5d3b4fa480cc0ae9ba41f7622ba00de74ba3a3fa24a64d9c9577a37e5e26e1e74b5fd7b3851e1c7256d44157b2f2c7a2a9cfd56a092b850ce66eb09d4cee320cebc972cb26565b6159f83d6e41e8c860b55169ed638c069639becb537110c18009f6e8008369720019879064413cdff9cab65e934fbda06a74daadcab1d9c9f0650189d11", 0x92}], 0x8}, {&(0x7f0000001380)=@in6={0xa, 0x4e23, 0x23, @rand_addr="d88abcd738274fdfd72cf1a77dee1201", 0x2}, 0x1c, &(0x7f00000016c0)=[{&(0x7f00000013c0)="1c68e8ead7a82d4f88df2e1d6b4aecad9ed725ff8f6c088d3b1af2ad2b2a9fa76b27acc5ba23cb993b9b4f47305168865ed37b263884e8", 0x37}, {&(0x7f0000001400)="0fa05f980674290d40ef2152c01dc2bb877886264f75e58ae2b952204f613da23060617f7af3e4b7de899b63d6da9b7ea9f76d090bb6794d01a22d3d39cb48ecff20e67b6e2dc16be52bbfffc8a1f15197e346fc5e5dd6a37a87921a1155b7f7c82ce7a2e2cd819092c2dfde6750300d26ff0dcbfd182223ad566b37c982698fdaed02ce25687fad375a3bc124b1ee8e", 0x90}, {&(0x7f00000014c0)="83a001a77c01aeaf6ee7624d92def0344a2b70bfd91f382286e5cc4bf506cbae3d8c49a15a058cfbd5b6e0fb8d28d1cdf616a4a59d885fc976ffad92dd480a03313ef612b8cc0a6ced89e3b693d3c37853f7b23d37e7dda864aeddcd9b7ea8f6e21ea1d349b31c0d13bccab14b38f194b12ce9d15b4aa4afcadcbfd1b9de513257ea3043c7222d51f476dabdebc65f6739640c491f7538f0fd964c1e017fba90ddcc2f1518d92ce97bd6f8ba3adb600880d13758d2a32d940a76e88a7218a4de36a107932690173864c7f7819bc7", 0xce}, {&(0x7f00000015c0)="f486a012265d4355c0fa58adca7c262faea27c1d35b2390198682ea4c7603eaf1661f1ec7a278d511938a0dd45d7693b20072fa51a7c70b7f1502c192ac93c6e15595275e2edb8843cca831c4f761ce6af9026d478a20f06a57253564b1c6984754cb204f5f24233e7c3f9fb2c9652d62caec4a73601660e89cdac2f89adf3372d19fcba0676e6170a2682bde4ec608a2d8bef39b9d67af099213e240db8011d6c40e4ea74af0d01eb478689845f41748859da79d938b6b081fa11c6195b7dcd8f07982cb2f9d67f43febaec0932aa54e603e46e1e05a4f98bd1", 0xda}], 0x4, 0x0, 0x0, 0x8004}], 0x5, 0x5d9e39c26c51857a) 02:37:20 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:20 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0x0, 0x0) 02:37:20 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:20 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:20 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:21 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:21 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfff, 0x400) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b208144d50f94fd91082cc787d93b6fe9d880d2cfca023925a5ba7d1160fdc34e6d79b356a4a658faef28ea865c71c6125a0fe2b53d869e17215d0da7b3958e2a2c3fc70c59accecfdccfc7507c9daf4c24b483619feb43121b99658807757d57f795558e8669c986f605b61290cb65053d3e82f65783eac5cfc0272c38abf785b781458319439d495fe", 0x8a) prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) getpid() 02:37:21 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:21 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:21 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:21 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}, 0x0, 0x0, 0x0, 0x0) 02:37:21 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:21 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000080), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) r0 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 02:37:21 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:21 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:21 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}, 0x0, 0x0, 0x0, 0x0) 02:37:21 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:21 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) [ 131.752972][ T24] audit: type=1400 audit(1563071841.532:45): avc: denied { create } for pid=10662 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 02:37:21 executing program 2: getpid() r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x400080, 0x0) socket$rds(0x15, 0x5, 0x0) accept$ax25(0xffffffffffffffff, &(0x7f0000000140)={{0x3, @null}, [@bcast, @bcast, @default, @null, @rose, @default, @default, @bcast]}, &(0x7f00000001c0)=0x48) accept4$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @initdev}, &(0x7f00000002c0)=0x1c, 0x80000) socket(0x10, 0x0, 0xffffffff7fffffff) ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000380)={[{0x7, 0x4a, 0xffff, 0x8, 0x8001, 0x300000000000, 0x5, 0x6, 0x805, 0x7fff, 0x7, 0x20, 0x200}, {0x3, 0x638, 0x8, 0x9, 0x6, 0x9, 0x5, 0x2, 0x2, 0x5, 0x9, 0xa4b, 0x1}, {0x1, 0x401, 0xfffffffffffff800, 0x5, 0x8, 0x100000001, 0x2, 0x9, 0x3, 0x10000, 0xff, 0x80000000, 0x6}], 0x2}) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/mls\x00', 0x0, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000340)='/dev/input/mouse#\x00', 0x5, 0x8000) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0x80000025) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0xfffffffffffffe5d, 0x3, 0x0, {0x4, 0x11, 0x0, '/dev/dlm-monitor\x00'}}, 0x32) prlimit64(r3, 0x2, &(0x7f0000000100)={0x975}, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) [ 131.885731][ T24] audit: type=1400 audit(1563071841.532:46): avc: denied { ioctl } for pid=10662 comm="syz-executor.2" path="socket:[33842]" dev="sockfs" ino=33842 ioctlcmd=0x5411 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 02:37:21 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:21 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:21 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0x0, 0x0) 02:37:21 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:21 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:21 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f00000000c0)) prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000040)=0x80000001, 0x2) 02:37:21 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:22 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000}, 0x0, 0x0, 0x0, 0x0) 02:37:22 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:22 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:22 executing program 2: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000001c0)=0x0) prlimit64(r0, 0x20000000002, &(0x7f0000000200), 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') write$UHID_INPUT2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="0c000000390061a743e23f24d701f0134f62183949e56f1cdb0130b3d793f3b553ddf6b38e5b522ea055552ca1e78433da7471e4c2295c0010078bc77196f6"], 0x3f) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r2, 0x101, 0x70bd25, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x14}, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 02:37:22 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:22 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:22 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0x0, 0x0) 02:37:22 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:22 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:22 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:22 executing program 2: prlimit64(0x0, 0x2000000011, &(0x7f0000000040)={0x0, 0x7}, 0x0) prctl$PR_GET_TSC(0x19, &(0x7f0000000000)) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffe000/0x2000)=nil) 02:37:22 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}, 0x0, 0x0, 0x0, 0x0) 02:37:22 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:22 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:22 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:22 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x400, &(0x7f0000ffc000/0x2000)=nil) 02:37:22 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:22 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:22 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:22 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}, 0x0, 0x0, 0x0, 0x0) 02:37:22 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:22 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:22 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x8a, 0x101000) connect$bt_sco(r0, &(0x7f0000000040)={0x1f, {0x7, 0xfffffffffffeffff, 0xed, 0x6, 0xc42d, 0xcec}}, 0x8) 02:37:22 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:22 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:23 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0x0, 0x0) 02:37:23 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:23 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x14000, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 02:37:23 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:23 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:23 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:23 executing program 2: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x22402, 0x0) ioctl$SIOCAX25DELFWD(r0, 0x89eb, &(0x7f0000000040)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}) prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) recvfrom$unix(r0, &(0x7f0000000080)=""/56, 0x38, 0x40000101, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 02:37:23 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:23 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000}, 0x0, 0x0, 0x0, 0x0) 02:37:23 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:23 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:23 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:23 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:23 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000000)=[0x10001, 0x3], 0x2) 02:37:23 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:23 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:23 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) syz_emit_ethernet(0x2a, &(0x7f00000000c0)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xffffff84, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x2b6}}}}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:23 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:23 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:23 executing program 2: r0 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x0, 0x2) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f00000002c0)={0xffff, 0x6, 0x1f, 0x2d, [], [], [], 0x0, 0x3, 0xf5, 0x4, "2433b0584a54fe7703744589148475d3"}) prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) getresuid(&(0x7f0000000540), &(0x7f0000000140)=0x0, &(0x7f0000000180)) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r1, r2) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) r3 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x80000, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v2={0x2000000, [{0x1, 0x6}, {0x6, 0x800}]}, 0x14, 0x3) write$P9_RSYMLINK(r0, &(0x7f0000000500)={0x14, 0x11, 0x2, {0x0, 0x2, 0x3}}, 0x14) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000400)=""/227) 02:37:23 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:24 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:24 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f00000001c0)={0x9, 0x0, 0x2, 0x5, [], [], [], 0x7f, 0x9, 0x3, 0x60000000, "2781532e3380cfd7ba4343d3a965ef52"}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) r1 = semget$private(0x0, 0x3, 0x100) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x1, 0x4) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f00000000c0)=""/14) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x0, 0x4) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', &(0x7f0000000140)='./file0\x00', 0xffffffffffffff9c) 02:37:24 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:24 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:24 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x200, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000040), 0x10) 02:37:24 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:24 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:24 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:24 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) r0 = msgget$private(0x0, 0x400) msgctl$MSG_STAT(r0, 0xb, &(0x7f00000000c0)=""/1) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:24 executing program 2: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000140)={0x9, 0x7af}) keyctl$get_keyring_id(0x300, 0x0, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80040, 0x0) ioctl$sock_proto_private(r1, 0x89e2, &(0x7f0000000040)="d00eb967eb651ce5205f4c5144078a09cfbc7cd2ac8a0bab019e8f9c15e640f4a2885b8213b3ca08a829ca6229128f4be23a3626ab2ae073d76f4f10c08ca3bfe006c944165389b345f6d52098b6d8ad6ac902da8666ae0e7a0168a7de5f46040beb94ddf91345973204da443de6e78b166857388c03a5bb0f7a62c78671be7557eddab2dadd89757bcd1e09b8") 02:37:24 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:24 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:24 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:24 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:24 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) accept4$netrom(r0, &(0x7f00000000c0)={{0x3, @default}, [@rose, @remote, @default, @null, @rose, @default, @default, @null]}, &(0x7f0000000200)=0x48, 0x800) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:24 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x535800, 0x0) ioctl$BLKGETSIZE64(r0, 0x80081272, &(0x7f0000000040)) prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 02:37:24 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:24 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:24 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:24 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:24 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000080)=0x1) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)="e9f56f9c78abed5f8a03fdc979185b366a0cfbc70789b05d15a3576389", 0x1d, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000280)={r2, 0x92, 0x8a}, &(0x7f00000002c0)={'enc=', 'raw', ' hash=', {'streebog512\x00'}}, &(0x7f0000000340)="a62e5f160da275715ad2b7c225eaaeabedd759a7f5ceec2b1b3bb72b9b8f2e6f93cc1518ab8a9b35bd53335d4d13a8b621091ca5d76593c79d07cfe8eb6b7ee04edfd5140fa8231e5726018a26a0ee10b9e898a9d4ef3a0f3e2d66d91f3f0121fabbec241a96e435a5dd8afde3233f24aed852cbae94eb38ed2d57a111ae8b5a0187d6d41e3fca61d30b18f92b248a5aca70", &(0x7f0000000400)=""/138) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='/dev/rtc0\x00') ioctl$RTC_WIE_OFF(r0, 0x7010) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x80, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) write$P9_RLINK(r0, &(0x7f0000000100)={0x7, 0x47, 0x2}, 0x7) 02:37:24 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:24 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:24 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:24 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:25 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x41, 0x0) write$P9_RWSTAT(r0, &(0x7f0000000040)={0x7, 0x7f, 0x2}, 0x7) 02:37:25 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:25 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:25 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@empty, 0x8, 0x2, 0xff, 0x4, 0x6, 0x10001}, 0x20) select(0x40, &(0x7f0000000100)={0x758, 0x4, 0xff, 0x6, 0x4, 0xe3, 0x5f7, 0x1}, &(0x7f0000000140)={0x5, 0x7ff, 0x2, 0xfffffffffffffff7, 0x1, 0x6, 0x0, 0x2}, &(0x7f00000001c0)={0x9, 0x2, 0x61, 0x20, 0x3, 0x100000000, 0xd8d, 0x3ff}, &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x282}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)=@ipv6_delrule={0x94, 0x21, 0x112, 0x70bd26, 0x25dfdbfc, {0xa, 0x14, 0x10, 0x6b6, 0x6, 0x0, 0x0, 0x4}, [@FRA_DST={0x14, 0x1, @mcast1}, @FRA_DST={0x14, 0x1, @loopback}, @FRA_DST={0x14, 0x1, @dev={0xfe, 0x80, [], 0x1a}}, @FIB_RULE_POLICY=@FRA_SUPPRESS_PREFIXLEN={0x8, 0xe, 0x7}, @FRA_DST={0x14, 0x1, @local}, @FIB_RULE_POLICY=@FRA_TABLE={0x8, 0xf, 0x3f}, @FRA_DST={0x14, 0x1, @dev={0xfe, 0x80, [], 0x1e}}]}, 0x94}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) r1 = shmget(0x2, 0x1000, 0x210, &(0x7f0000ffe000/0x1000)=nil) shmctl$IPC_RMID(r1, 0x0) 02:37:25 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:25 executing program 2: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000000)={0x0, 0x0}) prlimit64(r0, 0x20000000202, &(0x7f0000000200)={0x0, 0x800}, 0x0) r1 = syz_open_dev$sndtimer(&(0x7f0000000240)='/dev/snd/timer\x00', 0x0, 0x400) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000280)) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x40, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f0000000140)={'nat\x00', 0x0, 0x3, 0x7a, [], 0x3, &(0x7f0000000080)=[{}, {}, {}], &(0x7f00000000c0)=""/122}, &(0x7f00000001c0)=0x78) 02:37:25 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:25 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:25 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) futex(&(0x7f0000000000), 0x81, 0x1, &(0x7f0000000100), &(0x7f0000000180)=0x1, 0x2) fcntl$setown(r2, 0x8, r1) pselect6(0x40, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 02:37:25 executing program 2: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000002, 0x10, r0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x8080, 0x0) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000200)=0x1) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x9, 0x7f, 0x271, 0x401, 0x48bf}, &(0x7f0000000140)=0x98) openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x4000, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000180)={r2}, 0xc) 02:37:25 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:25 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:25 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:25 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) [ 135.893008][ T24] audit: type=1400 audit(1563071845.672:47): avc: denied { map } for pid=10966 comm="syz-executor.2" path="/dev/nbd2" dev="devtmpfs" ino=16668 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 02:37:25 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:25 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:25 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:25 executing program 2: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f00000000c0)=0x1c, 0x80000) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)) r1 = fcntl$getown(0xffffffffffffff9c, 0x9) prlimit64(r1, 0x2, &(0x7f0000000040), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 02:37:25 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:25 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:26 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(r0, &(0x7f00000000c0)={0x2}, 0xffffff2b) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000100)=0x80000001) openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x100, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:26 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:26 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:26 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:26 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000040)) getresuid(&(0x7f00000001c0), &(0x7f0000000480)=0x0, &(0x7f00000004c0)) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x4, &(0x7f0000000400)=[{&(0x7f0000000100)="4fdd9623ee7cb439474102eed83af87a684f671bd5a58b2159dfac7440fa29c16f33c4000a3f37a96ca82b0218451e9fff61ca4288fa38f3738d7299cd8d82cbac89ff5a600e8dc112a790f3d903db25c0d5699650e74bdaef18290ae0c01754648fcbac8030fd8fd0fd00515f0c75a1cb04d5e9ebf1ff2138bf24864de30ca54a20", 0x82, 0x80}, {&(0x7f0000000240)="b6d2879e5f328a6fcef5451846bd5b3784026401bb0cac9fa9132798d90fe991f49442712683b60e41780773a676e4d004a0e87f20a24a088f3d27e5726342af53958fa311704f8f8778eef1fd16c21c2a3763eb134e882ca1be29031a2655aefd9f07891b881871d8d8cd587f1bd450d3520244357e8a0d20edfe3faa88312af29ff597fc8ff65599246eb0a76f5e94200397399d5cb93e0bdf504a75b359309507754928cef0c4af33b6c80a", 0xad, 0x1000}, {&(0x7f0000000300)="dff5df5ef5d81d4a51570e071ba36dcc7b4fc8ed542b696339b73d1a45b2c3a0768e290112f4d8435dce1b64e5b3786cdb8d5fe28c0d09a5edd551cd76b053595ac3c779b69a2a69bffd6526de5a70fa7aa146cd93ef381021daf1b1f17e2eb1", 0x60, 0xab72}, {&(0x7f0000000380)="318dc7b6ff517ec12ca18feefa0101995e4a799902595c670e9564ef8d174a28fadddb673fb6e67a210380c399a857c19a07e87ba661bb6024f18e437c0d3844add84f0ed8478cd4433b", 0x4a, 0x401}], 0x10000, &(0x7f0000000500)={[{@quota='quota'}, {@upgrade='upgrade'}], [{@func={'func', 0x3d, 'PATH_CHECK'}}, {@seclabel='seclabel'}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fowner_gt={'fowner>', r1}}, {@smackfstransmute={'smackfstransmute', 0x3d, '$'}}]}) 02:37:26 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:26 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:26 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:26 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 136.661808][T11016] gfs2: invalid mount option: func=PATH_CHECK [ 136.668300][T11016] gfs2: can't parse mount arguments 02:37:26 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:26 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) r0 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x800, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x40000, 0x0) r4 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000100)={{0x3, @null}, [@bcast, @rose, @remote, @bcast, @bcast, @remote, @default, @default]}, &(0x7f0000000180)=0x48, 0x80000) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000300)={0x1, 0x7fffffff, 0x0, {0xf, @sdr={0x41415270, 0x1}}}) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000240)={0x7f, 0x8, 0x5, 0x0, 0x0, [{r1, 0x0, 0x6}, {r2, 0x0, 0x80}, {r3, 0x0, 0x7}, {r4, 0x0, 0x8}, {r5, 0x0, 0x1f5}]}) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 02:37:26 executing program 0: signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x0, 0x0, 0x0, 0x7, 0x5}, 0x0, 0x0, 0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000100)) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f00000000c0)={0x8, 0x3, 0x8}) 02:37:26 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:26 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:26 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:26 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:26 executing program 2: mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8002, &(0x7f0000000000)=0x9, 0x100, 0x5) prlimit64(0x0, 0x20000000002, &(0x7f0000000200)={0x0, 0xfff}, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000005c0)='/dev/vbi#\x00', 0x0, 0x2) bind$vsock_dgram(r0, &(0x7f0000000600)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 02:37:26 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:26 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:27 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:27 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:27 executing program 0: ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000100)={0x0, @speck128}) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:27 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:27 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:27 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x4000, 0x4, &(0x7f0000ffa000/0x4000)=nil) r0 = open(&(0x7f0000000000)='./file0\x00', 0x20400, 0x4) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, &(0x7f0000000080)={0x100000003, 0x9, 0x10001}) 02:37:27 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:27 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffffb, 0x20000) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bpq0='bpq0\x00', 0x316, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0xfffffffffffffffc, 0x1, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={0x100}, 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) r3 = accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14, 0x800) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', r4}) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000240)=0x400000) fsetxattr$security_evm(r2, &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="0408ff0700000000000033548a321ba9ca2a91e0729778fe6a24286005b24ca800eae902483cc1dba13e29943097f8066fa56a8089dd5d157ceecb0a54892e5fe2"], 0xe, 0x1) 02:37:27 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:27 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:27 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:27 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) r0 = socket$alg(0x26, 0x5, 0x0) r1 = dup2(r0, r0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r1, 0xc1205531, &(0x7f00000000c0)={0x9, 0xfffffffffffffffb, 0x84e, 0x2, [], [], [], 0x4, 0xffffffffffff5fd0, 0x0, 0x7, "b834a4a58bc9505da29e7c2126282af7"}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x80, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x0, 0x4, 0x83, 0x5, 0x8000}, 0x2c2) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x4a, 0x0, 0xffffffffffffff9c}, 0x2c) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x40000000003, 0x0, 0x77fffb, 0x0, 0x10020000008, 0x0}, 0x2c) socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) rt_sigaction(0x1, &(0x7f00000002c0)={&(0x7f0000000240)="44d96900c4838579f1c5673e65f2400f1bc1450fbf1e31d1c4e14171f4e6c4a1dc5f4933f344902ef30fc271fc31c4a1fd5a21", {0x6}, 0x50000000, &(0x7f0000000280)="f0288909000000430f135800c401cdf3ee64f30fbdc167f3d8e0c4a1fd7c9cb88500000041dda1234032e941d8c8f3440f5f6e4cc401797e14ef"}, &(0x7f0000000380)={&(0x7f0000000300)="d9fc64f70f70e0a1f7f3a747d3fe66440f3825f00f0f7e0694c461fe2c3ac402b1474f00c403c96c6200d9c403b1cf49fa00", {}, 0x0, &(0x7f0000000340)="f30fa6c0f2410f1b6b0965f0450fbb7f26c483756c900600000000420f5944d3352d00088041400fd9d6c442adde51ce4788248bc4627d1a27"}, 0x8, &(0x7f00000003c0)) 02:37:27 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:27 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:27 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:27 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:27 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@mcast1, @in=@local}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f00000002c0)=0xe8) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000340)=ANY=[@ANYBLOB="0400000000000000060000000000000004000000ad08000075ca0000ffffff7f81000000000000000000000000000000000000000100000002000000040000005f7f0000ff000000490b00000000000000000000000000001d000080ff7fffff04000000040000000002000008000000020000000000000000000000000000000b0000000200000000000000cb000000000000000000000005000000000000000000000000000000219e"]) openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:27 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 137.875342][ T24] audit: type=1400 audit(1563071847.652:48): avc: denied { map_create } for pid=11101 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 02:37:27 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:27 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:27 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) [ 138.006641][ T24] audit: type=1400 audit(1563071847.652:49): avc: denied { map_read map_write } for pid=11101 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 02:37:27 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x80000, 0x4) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x10000, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000140), &(0x7f0000000180)=0x4) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) futimesat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{r2, r3/1000+30000}, {0x0, 0x2710}}) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 02:37:27 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:27 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:28 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000340)={0x0, 0xfffffffffffffff7}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000400)={r1, 0x6fa, 0x98fb986307b9d18d}, 0xc) pselect6(0x40, &(0x7f0000000000)={0x29}, 0x0, 0x0, 0x0, 0x0) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000040)=0x4, &(0x7f0000000280)=0x4) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000005c0)=0x3, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = epoll_create1(0x0) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r2, &(0x7f0000000000)) r5 = epoll_create1(0x0) r6 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0xcc55, 0x4100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket(0x10, 0x803, 0x0) sendto(r7, &(0x7f0000000300)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000500)=ANY=[@ANYRES32=0x0, @ANYBLOB="6b00000027a8963e5484f4f01041b4bf6a9916b002308372888c1e20f9e5a9026430f681896ffaf6f489693e62a44dcb4cc68c10f23bfb74991be776fe5a053ee4743e57d828e4830a248d0eeb87a8c06c2684b1616eb7b8bf84e619630cd46b44c654184731a2000000000000000022f3506d6a4f4d6e46f07217fa3b67cc0e8a4f53b761ad987891c5623241d497ea81ef5a7ebcda9495e46d0c5de24e21c86d0b4c"], 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r6, 0x84, 0x70, &(0x7f0000000400)={r8, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1e}}}, [0x80000001, 0x1, 0xec, 0x8000, 0x0, 0x2, 0x7, 0x300, 0x6, 0x0, 0x1, 0x2, 0x7, 0x9, 0x7]}, 0x0) recvmsg(r7, &(0x7f00000003c0)={0x0, 0xe2, 0x0, 0x0, 0x0, 0xfffffffffffffdec}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x68, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0x77e, @remote, 0x3}, @in={0x2, 0x4e20, @multicast2}, @in6={0xa, 0x4e24, 0x85b6, @remote}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x19}}]}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000200)={r9, 0xbc, 0x2, 0x401}, &(0x7f0000000240)=0x10) accept4$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @reserved}, 0x10, 0x800) 02:37:28 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:28 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:28 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:28 executing program 2: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x97, 0x27c4000000000, 0x58a, 0x5, 0x7}, 0x14) prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) 02:37:28 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:28 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f00000000c0)) 02:37:28 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:28 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:28 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:28 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:28 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xad, 0x81) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000080)=r0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f0000000040)=0x4) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 02:37:28 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:28 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:28 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x1000, 0xffffffffffffffff, &(0x7f0000003000/0x1000)=nil) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x80000000, 0x2000) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) write$P9_RREADDIR(r0, &(0x7f0000000040)={0x2a, 0x29, 0x8, {0x100, [{{0x2, 0x1, 0x5}, 0x9, 0x5, 0x7, './file0'}]}}, 0x2a) 02:37:28 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KVM_GET_CPUID2(r0, 0xc008ae91, &(0x7f0000000100)={0x1, 0x0, [{}]}) fcntl$setsig(r1, 0xa, 0x2f) clock_getres(0x2, &(0x7f00000000c0)) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:28 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:28 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:28 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:28 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x880, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000080)={&(0x7f0000000040)=[0xb, 0x3, 0x3011, 0x0, 0x4, 0x100000001, 0x1, 0x9, 0x8, 0x2], 0xa, 0x7ff, 0xff, 0x7, 0x9, 0x6, {0x0, 0x7, 0x35, 0x8001, 0x2, 0x4, 0xfffffffffffffffe, 0x2, 0x0, 0x8, 0x2, 0xba2, 0x1, 0x4d3d, "ff015eda39932ab559592ed823d0963f77abf35c8bbba206a072f8efbc0063b9"}}) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000100)=0x2, 0x4) r1 = getpgrp(0x0) prlimit64(r1, 0xf, &(0x7f0000000140)={0x0, 0x100}, &(0x7f0000000180)) 02:37:28 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:28 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:29 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:29 executing program 0: signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x200100, 0x0) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f00000002c0)=""/4096) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x4}, &(0x7f0000000100)=0x8) r3 = getpgid(0xffffffffffffffff) capget(&(0x7f0000000200)={0x39980732, r3}, &(0x7f0000000240)={0x7fff, 0x0, 0x5, 0x401, 0x1f, 0x5}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000140)={r2, 0x995, 0x3}, &(0x7f00000001c0)=0x8) 02:37:29 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:29 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) [ 139.332397][ T24] audit: type=1400 audit(1563071849.112:50): avc: denied { getrlimit } for pid=11205 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=process permissive=1 02:37:29 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x7, 0x2) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040), 0x0) 02:37:29 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:29 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:29 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:29 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x8502, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f00000000c0)) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) syz_read_part_table(0x400, 0x8, &(0x7f00000014c0)=[{&(0x7f0000000140)="aff84466dff9d04c5b6d63be83608bfaa332c4bc2138fee946f6266793da5de11479f9c542a42d0b927577ce3c8a61e9da546b1477c998", 0x37, 0xfff}, {&(0x7f00000001c0)="ef8ae0fdd044da0f1060a5dc194cb947a2a3e797ac2d1d78a673443d14b8ce64e9d483a0a14b1ba0da14e6bdf21910a2bbea2f46549e6e17c03fb168988ccf8b7aa98a564707b21a9a78bb7a099438350d8ea8d73a", 0x55, 0x2}, {&(0x7f0000000240)="a6737d763e6650155badd1b3edcf3e8db3d196e40ef1fe33b475ecab03ca4cc6fc53486e2aac76e18fcb5f40445f72205c433c1efc883f28657fda227783d2d70bc05352e3a027d4370847d1381b0fcd595ae199c95edaf1", 0x58, 0x2}, {&(0x7f00000002c0)="22895e4359a4f83a1fd145a1335ea0de26b1d628d3", 0x15, 0x100}, {&(0x7f0000000300)="c9a48371c8dcadeef49f2e0c6fa644d9b90e20a3faa76b6c64ccb026ef3da69d57d7a90f11224b6acaaee9d1525d2e71016a12fa43c261c3fbd7a15db5811287e135f55fca6aa833f0ea49c8a46c21cc32a403d9147edf914fb1cb16f7b96e0efbac71", 0x63, 0xffffffffffffdb84}, {&(0x7f0000000380)="3a003ab968e05295e5f71dd7e58a6a709d8ebadb65b94999c7b4c7d1689a9738f9ca511f053f7101c4dca8c577a76cd8d604accb0e77a1e5851614fd79bbb8338edaebeb6a7d98241986e4419219a94e94583d2580b8245ab998e83a41d75beae9563737b6fdb1a9a1c08ca0b857001eda83211fe4568b67e9dec9d7a87fba45d436286ff65ca2bad7da19be9d54c8f247c557647befc203c6b44a1c29cbebad79245238dd944ba39c4b1b13564f", 0xae, 0xb5e}, {&(0x7f0000000440)="89f5079b5901634af9532ce2888b6cd07781402a06a1c415e168201283f67b71590861b69b2d01dc7feb9fb856eac50ddbf7ad0c81c78eb317f29a37de36f693588a14f47043034be486cae8fc8e4a4f0564a7880c3fa0d50cef192f5a0136421fc6", 0x62}, {&(0x7f00000004c0)="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", 0x1000, 0x8}]) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:29 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:29 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:29 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:29 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") socket$inet6(0xa, 0x3, 0x2f) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x40, 0x1f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, 0x0) getresuid(0x0, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) mbind(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x3ffc, 0x0, 0x13, 0x5) sendto$inet6(r1, &(0x7f0000000540)='\b', 0x1, 0x3fffffa, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000), 0x4) socket$nl_crypto(0x10, 0x3, 0x15) 02:37:29 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:29 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:29 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:29 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:29 executing program 2: r0 = getpid() prlimit64(r0, 0x7, &(0x7f0000000040)={0x0, 0x1}, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x0, 0x2) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f0000000280)={[0x0, 0x3000, 0x2000, 0x100000], 0x100, 0x80, 0x100000001}) prlimit64(r0, 0x1, &(0x7f0000000080)={0x8, 0x7}, 0xffffffffffffffff) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) prlimit64(r0, 0x5, &(0x7f00000001c0)={0x5, 0x907}, &(0x7f0000000200)) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r2, 0x80845663, &(0x7f0000000100)) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x2001f, r2, 0x20) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 02:37:29 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x200, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:29 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:29 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:29 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:29 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:30 executing program 2: getitimer(0xb05aaf345d0adc41, &(0x7f0000000000)) prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 02:37:30 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:30 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:30 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r0, 0x5) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:30 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:30 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:30 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:30 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x105080, 0x0) ioctl$SIOCX25SCALLUSERDATA(r0, 0x89e5, &(0x7f0000000080)={0x4f, "f143eede3f2d2c585c25ceb5cca26eedb0c2fd08ea3e399f497aab1bbe66d8eaf7bcf1b983383006781b686f8ba469f9c6a366224a15865dc0785b28eb4b95abbe49283983bc2a9140e35c0cdd4d7f55682dc5b937a0baaf1fd2f38229b83d8d21ee03127a2285e0c9e6192a647774b92c829e3bbdf2b5dbccdfd33fdc866adf"}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000040)={0x2f, @empty, 0x4e20, 0x4, 'wlc\x00', 0xb, 0x8f3, 0x14}, 0x2c) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000140)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) bind$xdp(r0, &(0x7f0000000240)={0x2c, 0x0, r1, 0x27, r0}, 0x10) 02:37:30 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:30 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:30 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:30 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e20, @multicast1}}, 0x9, 0x6}, &(0x7f0000000100)=0x90) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000140)={r1, 0x5, 0x6}, 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f00000000c0)={&(0x7f0000ffe000/0x1000)=nil, 0xfffffffffffffffb, 0x5, 0xb8, &(0x7f0000ffc000/0x4000)=nil, 0x9}) 02:37:30 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:30 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) r0 = accept4$netrom(0xffffffffffffffff, &(0x7f00000000c0)={{0x3, @rose}, [@netrom, @netrom, @netrom, @rose, @remote, @bcast, @netrom, @rose]}, &(0x7f0000000140)=0x48, 0x80800) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000180)) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) write$P9_RWALK(r1, &(0x7f0000000040)={0x57, 0x6f, 0x2, {0x6, [{0x4, 0x4, 0x2}, {0x40, 0x0, 0x3}, {0x80, 0x4, 0x1}, {0x0, 0x1, 0x2}, {0x4a, 0x4, 0x5}, {0x1, 0x3, 0x6}]}}, 0x57) write$binfmt_misc(r0, &(0x7f00000001c0)={'syz0', "b2ca0aa781c35c033c41"}, 0xe) 02:37:30 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:30 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:30 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:30 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:30 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:30 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x8001, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:30 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:30 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:30 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000000), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 02:37:30 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:30 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:31 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:31 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:31 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = signalfd(r0, &(0x7f00000003c0), 0x4730718c66474bcf) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0xc9, "1e79ddaf0cb6a56e8c4b72d3decc4654f2f1d12d83ac466794c96d35096e4b503a04e52353031236b9d1422c7fc9e5fda1765a87e85c4fea8fde7545690924dc924a95faf817e84434bb4517fecbb4477c5636edeb4e1921756c21109acb53335f59e8487e64cd29bfd4f7279a77d3885a8c1aa2f3659bce96e9473de9f9a129608d1b06e8fda75e573fdcc70a9c4c3047f7e62f62f3290d9f257b66c5c08cf3b8d4fca12e4ce70125531eeb1e538a40d5dc421442c215c81087e13b93eba8b8f08834356218f8329e"}, &(0x7f00000000c0)=0xd1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000002c0)={r2, 0x1, 0x9, 0xfa46, 0x7f, 0x7, 0x6a0, 0x6, {r3, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1, 0x2, 0x2, 0xffff, 0x4}}, &(0x7f0000000380)=0xb0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x5, 0x0, 0x5, 0x1, 0x0, 0x3, 0x10, 0x2, 0x5, 0x7fffffff, 0x7ff, 0xdb1, 0x5, 0x3, 0x8, 0x2, 0x7, 0x6, 0x3, 0x81, 0x9902, 0x9, 0x0, 0x80000000, 0xfffffffffffffffb, 0xfff, 0x5, 0x3, 0x7, 0xc8a0, 0x400, 0x3, 0x81, 0x655d, 0x5, 0x1, 0x0, 0x6, 0x5, @perf_config_ext={0x4, 0xcbdc}, 0x20004, 0x3, 0x10001, 0x2, 0x100000001, 0x70f, 0x3}, r4, 0x4, r0, 0xa) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:31 executing program 2: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 02:37:31 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:31 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:31 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:31 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:31 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) 02:37:31 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:31 executing program 0: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x2, 0x34b201) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000100)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:31 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:31 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:31 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x100, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f0000000040)={0x0, 0x0, {0x80, 0x4, 0xa0037eddc5c491e9, 0x7, 0xf, 0x8, 0x3, 0x5}}) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 02:37:31 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:31 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:31 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x29, 0x4, 0x20000, 0x0, 0x401, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0) 02:37:31 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:31 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:31 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x442800) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040), &(0x7f0000000080)=0x4) 02:37:31 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:31 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:31 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) pselect6(0x40, &(0x7f0000000040)={0x29, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x7}, 0x0, 0x0, 0x0, 0x0) 02:37:31 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:31 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:32 executing program 2: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) setrlimit(0xf, &(0x7f0000000240)={0x0, 0x41}) getpeername$unix(r0, &(0x7f0000000080)=@abs, &(0x7f0000000100)=0x6e) prlimit64(0x0, 0x8, &(0x7f0000000040)={0x8, 0x8000000003}, 0x0) lookup_dcookie(0x6, &(0x7f0000000140)=""/222, 0xde) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3000, 0xfffffffffffffff7, &(0x7f0000ffd000/0x3000)=nil) 02:37:32 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f00000000c0)=0x1) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:32 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:32 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:32 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:32 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:32 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x20400, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v2={0x2000000, [{0x7, 0xfffffffffffffc90}, {0x2, 0x52c0}]}, 0x14, 0x1) 02:37:32 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x8000000000000000, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:32 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:32 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:32 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:32 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:32 executing program 2: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000000c0)) getpgid(0xffffffffffffffff) fsopen(&(0x7f0000000280)='xfs\x00', 0x1) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f0000000180)='/[proc\x00', &(0x7f00000001c0)="d5207a17feae63d66a9de80e7d2a922531ec4c17b43526ac53f7df28f3401dafc3959c6b325aa236ec3ae28d33567c7add81be7d2faf8c0527591d066837ec2a8ea80cfd9bca39e706d8a50e1a481f4e8232f2ef7c277659bf69eb2fff5fe0ca35f5a024df391c4399b43e0dcf7ca66c18ae1edd18ef8b3d78357a803af0d425cbb98beb11312edbc3ee1fdbd89374767bc20dd94040bd4c3a0de054cde49ace8c743360f9b713a0e4d7a896f9e7f3d7e3a5d1b89d245150a9b7617ec0e9", 0xbe) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000100)=0x0) r2 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14, 0x80000) setsockopt$sock_void(r2, 0x1, 0x24, 0x0, 0x0) prlimit64(r1, 0xd, &(0x7f0000000080)={0x4}, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 02:37:32 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:32 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:32 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:32 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:32 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:32 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000040)={'raw\x00'}, &(0x7f00000000c0)=0x54) sysfs$3(0x3) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000100)={0x77bd}, 0x4) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) accept4$x25(r0, &(0x7f0000000240), &(0x7f0000000280)=0x12, 0x800) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x7c, @dev={0xac, 0x14, 0x14, 0xe}, 0x4e23, 0x2, 'wrr\x00', 0x37, 0xd4, 0x28}, 0x2c) timerfd_gettime(r0, &(0x7f00000001c0)) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0xcda, 0x5, 0x8, 0x7fffffff, 0x7, 0x6, 0x3f, 0x1b, 0x7, 0x3, 0x7f}, 0xb) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0xffffffffffffffff, &(0x7f0000ffb000/0x3000)=nil) 02:37:32 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:32 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0x4}, 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) write$P9_RLINK(r1, &(0x7f00000001c0)={0x7, 0x47, 0x2}, 0x7) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000000)={@reserved}) 02:37:32 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:32 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:32 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:33 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:33 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x200000, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f00000000c0)={0x3004, &(0x7f0000000040), 0xc, r1, 0x8}) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 02:37:33 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r0 = add_key(&(0x7f00000000c0)='blacklist\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f00000001c0)="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", 0xfc, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000380)='GPL\x00', &(0x7f0000000340)) pselect6(0xab, &(0x7f0000000040)={0x1a85f0fd}, 0x0, 0x0, 0x0, 0x0) 02:37:33 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:33 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:33 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:33 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:33 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffff9c, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x2, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x10, 0x4, 0x8000}, &(0x7f0000000200)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x3}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x2bf, 0x0, r0}, 0xfffffffffffffdf9) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0xc0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x1, 0x0, 0x0, 0x0, &(0x7f00000003c0)={0x3, 0x5}, 0x0, 0x0, &(0x7f0000000400)={0x1, 0x6, 0x80, 0x1}, &(0x7f0000000440)=0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=0x9}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffff9c, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) prlimit64(r2, 0x0, &(0x7f00000000c0)={0x0, 0xffffffffffff0a40}, 0x0) 02:37:33 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:33 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:33 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$KDSKBLED(r0, 0x4b65, 0x4) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:33 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:33 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:33 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:33 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:33 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:33 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) socket$inet_sctp(0x2, 0x5, 0x84) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 02:37:33 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:33 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x100, 0x0) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f00000000c0)={0x40, 0x6, 0x6eb, 0x54, 0x1, 0x1ff}) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:33 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:33 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:33 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:33 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:34 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x410002, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x6) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) 02:37:34 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) ioctl$int_out(r0, 0x5460, &(0x7f00000000c0)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:34 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:34 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:34 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:34 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:34 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x8000, 0x0) sendmsg$nl_crypto(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@delrng={0x10, 0x14, 0x1, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48080}, 0x1) r1 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x7ff, 0x0) prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000280)={0x3b, 0x6, 0x0, {0x3, 0x4, 0x12, 0x0, '/dev/snd/midiC#D#\x00'}}, 0x3b) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040)='\x00'}, 0x30) fcntl$lock(r1, 0x5, &(0x7f00000000c0)={0x1, 0x1, 0x9, 0xebe, r2}) r3 = geteuid() r4 = getgid() write$P9_RGETATTR(r0, &(0x7f00000002c0)={0xa0, 0x19, 0x1, {0x100, {0x0, 0x2, 0x3}, 0x0, r3, r4, 0x3, 0x3, 0x9, 0x0, 0x1, 0x9, 0x51, 0xeca, 0x0, 0x1800000000, 0x1, 0x1da0, 0x80, 0x0, 0x6d886c0c}}, 0xa0) 02:37:34 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:34 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(r0, &(0x7f00000001c0)={0x1}, 0xfffffffffffffef9) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000040}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x38, r2, 0x404, 0x70bd28, 0x25dfdbfc, {{}, 0x0, 0x4101, 0x0, {0x1c, 0x17, {0xb, 0x4, @l2={'ib', 0x3a, 'veth0_to_hsr\x00'}}}}, ["", "", "", "", "", "", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x20000004}, 0x5) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) setpriority(0x1, r3, 0x4) ioctl$int_out(r1, 0x5462, &(0x7f0000000280)) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f00000002c0)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f0000000300)={r4, 0x1}) 02:37:34 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:34 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:34 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:34 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:34 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/mls\x00', 0x0, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000280)='/dev/cec#\x00', 0x0, 0x2) r3 = syz_open_dev$amidi(&(0x7f00000002c0)='/dev/amidi#\x00', 0x7, 0x101000) r4 = syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xbc5d, 0x100) r5 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x400001, 0x40) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000380)={0x1, 0x5, [{r1, 0x0, 0x100000000, 0x10000fffff000}, {r2, 0x0, 0xfffffffffffff000, 0xfffffffff0000000}, {r3, 0x0, 0x1000, 0x10000}, {r4, 0x0, 0x1000000000000, 0x1001000}, {r5, 0x0, 0x8000, 0x2000}]}) r6 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x201, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000040)={0x0, 0x8c, "2406f7380d24828f1203f48dcfd06e685eb724b26aa9e646d5445352997905c15f66f65d9abd21d20cd983aca2c805f761acad28e4b0906620f66f825d7a0433007cd6675d2e79300fe020dc5d1cd2961446b3369237f62a615578000a748aa80b80d8376c5b8b53183d915e02f5a4da815afad21fbf52e3a545b5027418a6e908cc0f69c8e89e5e271a75be"}, &(0x7f0000000100)=0x94) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r6, 0x84, 0x6d, &(0x7f0000000140)={r7, 0x2e, "4a9177bd08539ad6eacf66cc3c5d5a066603b2b0d1a9e0b97e30f9486c1457cf9968a60ebc229789722a2befa19e"}, &(0x7f0000000180)=0x36) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 02:37:34 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) r1 = shmget(0x2, 0x4000, 0x40, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_INFO(r1, 0x3, &(0x7f0000000300)=""/33) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) bind$vsock_stream(r0, &(0x7f0000000100)={0x28, 0x0, 0x2711, @reserved}, 0x10) rt_sigtimedwait(&(0x7f0000000140)={0x16cc823c}, &(0x7f00000001c0), &(0x7f0000000240)={0x77359400}, 0x8) getsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000280)=""/17, &(0x7f00000002c0)=0x11) ioctl$RTC_AIE_ON(r0, 0x7001) 02:37:34 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:34 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:34 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:34 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:34 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:34 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:34 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) 02:37:34 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:34 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:35 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:35 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:35 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:35 executing program 2: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) prlimit64(r0, 0x20000000002, &(0x7f0000000200)={0x0, 0x1}, 0x0) r1 = socket$bt_rfcomm(0x1f, 0x1, 0x3) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x3000, 0x4, &(0x7f0000ffd000/0x3000)=nil) 02:37:35 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:35 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:35 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:35 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:35 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:35 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:35 executing program 2: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) prlimit64(r1, 0x20000000102, &(0x7f0000000080)={0x8, 0x400000000}, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) pipe(&(0x7f0000000040)) 02:37:35 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:35 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:35 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x7fc, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:35 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:35 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:35 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x10000, 0x0, &(0x7f0000fef000/0x10000)=nil) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x9, 0x4000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ff6000/0x1000)=nil, 0x1000, 0x0, 0x4010, r0, 0x8000000) 02:37:35 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:35 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:35 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:36 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x4000, 0x0) signalfd(r0, &(0x7f0000000180), 0xfffffffffffffe92) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff731, 0x4}, 0x0, 0x0, 0x0, 0x0) 02:37:36 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) prctl$PR_MCE_KILL_GET(0x22) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 02:37:36 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:36 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:36 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:36 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e22, @rand_addr=0x1}}, 0x1, 0x6}, &(0x7f0000000380)=0x90) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000003c0)=@assoc_id=0x0, &(0x7f0000000400)=0x4) sendmmsg$inet_sctp(r0, &(0x7f00000009c0)=[{&(0x7f00000000c0)=@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000280)=[{&(0x7f00000001c0)="c3c6c29055f65b8018fc7ddd3a40b990bfa7ece04175e6d3be55ebe106f66bca2bc782eeef8444ffe572f985c4bc12bab7f3499a9a714dd4bc9540a253c702209c1078db62d3e7c365b8d79cc9d60af5d0e8cfea0650920931511d15d1bb1e05e19d0b7d23d1aabf336afcb3199e4926f0f61beaca6bde18c110fdacfa7be07cd87bd06094b8ea4c47bce684ea7bb9b7a1c3e9f3eecbddde102bc03b5b50b8a2e402", 0xa2}, {&(0x7f0000000100)="89fee69deddec93b3439a8c9513c6d23904a32173cd17ecfd383cef80446fded4e1daa44ed57e7a279921029d473af5dd40ca55c2a21ed2797ccf32e26805a49ffc60088f9ee10eb740af31ab2f92845997949", 0x53}], 0x2, &(0x7f0000000440)=[@authinfo={0x18, 0x84, 0x6, {0xdf53}}, @sndrcv={0x30, 0x84, 0x1, {0x2, 0x7, 0x208, 0x89, 0xffffffffffffffe1, 0x800, 0x7, 0x0, r1}}, @prinfo={0x18, 0x84, 0x5, {0x20, 0xfff}}, @dstaddrv4={0x18, 0x84, 0x7, @broadcast}, @sndrcv={0x30, 0x84, 0x1, {0x0, 0x101, 0x8008, 0x6, 0x1, 0x4, 0xf68f, 0xfffffffffffff801, r2}}], 0xa8, 0x80}, {&(0x7f0000000500)=@in6={0xa, 0x4e23, 0x81, @local, 0xffff}, 0x1c, &(0x7f0000000640)=[{&(0x7f0000000540)="a5096985caef39c775286483ad0c269578f7a354c687bac18874adde29af4593a5b049aad0dc395003341369304d080c050b8fec9d6a8b3fd09a1c110dec56257802f202612b59bc6656f65e6416961b62d65d4d9ca3bb8dd40c623132e9ca08785c6c62ed3c1e151497db6699996ef6dc3811424400efd721c1c06a9f7d22d700fe390053fb32fd92bc516278a09a5019f17d10d53b89e167a22b8f7d6e7c991162036bdd9c68", 0xa7}, {&(0x7f0000000600)="5e351a6f0150ea6f3b11be9b1d1d924c480615c155c5a8c221d800e308bf52245b92ea71de0503c251cf28518ccdbbb06107ecd7a24af7c1655bd6bdc8", 0x3d}], 0x2, 0x0, 0x0, 0x24048000}, {&(0x7f0000000680)=@in={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000000940)=[{&(0x7f00000006c0)="7fda7bc22fd9a41fba8afc6afbf6f6f1ccfa60a0b4baa4a58eea74805a07a175f4cf1f25261b72abd4bb6ac5ae9ac04c5c510c94c3ca052ee2443e2a6ba958c4a8ef917681bd143eb73709efd6288a5e21cb443ecf4fe906986e3230e3e56a9f31ce6294999009ab7f514f88198c449a898641d69c99f222baf3058887", 0x7d}, {&(0x7f0000000740)="d06737c29e4aef9d2249b959af6897e2f318ecfa7b40cc76dc27a005d942cc885590f3105f9383fe2a7457408e95b401532550b6fd4d96a801eb0889b3ef03bcfb9f47dbd28cc77a289fc99bbad2854eeb0e6afd10c7e9c5e5f49cdca22ea216565bc7681f8aba6dc3473f95a990618a9cdd716fc5b1858ddbbb4a059c8cb3316cf09dd94fad7ba3b89c2d7b2f5be7878efdcf95fd3dfe1a3faa7516b2edff90cdaab152fc229649183a1ec3034fa769c152b18499e175c431897b75a3a5c3d26035", 0xc2}, {&(0x7f0000000840)="37332008254d5d00cb2351a25ea14748f5b86bd02480e6477ecd94c8a695337896c5126a1b1b3f56785e61438594e94e5a197e585e7afeceac31f4e333561d10ed9d27352324539093c61151bd05a24dde1b89ba3357a6afd5e199d4f6", 0x5d}, {&(0x7f00000008c0)="37a7226c3b8cb69bf5a5a2e5a22c97cbed6890605ca6400a960e116db6128cd412622d836885a1f7a9cc3cce3ee447caa9ae883b933e47be91d38488eb61652f0e5aa617476c3d76f2479493673102f200f15d", 0x53}], 0x4, &(0x7f0000000980)=[@dstaddrv6={0x20, 0x84, 0x8, @loopback}], 0x20, 0x80}], 0x3, 0x4000000) 02:37:36 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) 02:37:36 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:36 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:36 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:36 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:36 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:36 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) r0 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x10001, 0x400) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x100}) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000140)) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7, 0x40000) bind$nfc_llcp(r1, &(0x7f0000000040)={0x27, 0x1, 0x0, 0x2, 0x9bf1, 0x9, "7a8be069cfd2efe96b91cfd262277c94ff0eac9a74b723658bdee189168cbe7b42063ea6afcdb119f74c1397cb1d3fdecfc601e312b4063e04d2dd099d6141", 0x1f}, 0x60) r2 = pkey_alloc(0x0, 0x3) pkey_free(r2) 02:37:36 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) 02:37:36 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:36 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:36 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:36 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000ff8000/0x8000)=nil, 0x8000, 0x10000, 0x3, &(0x7f0000ff0000/0x10000)=nil) 02:37:36 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(r0, &(0x7f0000000140)={0xfffffffffffff9cc}, 0x8) write$P9_RLOPEN(r0, &(0x7f00000000c0)={0x18, 0xd, 0x2, {{0x20, 0x3, 0x5}, 0x9}}, 0x18) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000100)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_STAT(r1, 0x2, &(0x7f00000000c0)) 02:37:36 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:36 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:36 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:36 executing program 2: openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x88000, 0x0) prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 02:37:36 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:36 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000000)) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:37 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:37 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:37 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:37 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:37 executing program 2: gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x2, &(0x7f0000000040)='^\x00', 0xffffffffffffffff}, 0x30) r0 = getpid() getpgid(r0) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x29, 0x400) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x2) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) prlimit64(r2, 0x20000000002, &(0x7f0000000200)={0x100, 0x3}, 0x0) mremap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 02:37:37 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="39000000130009006900000000000000ab0080480300000046000107000000141900210010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:37 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:37 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:37 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:37 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) [ 147.604671][T11835] netlink: 'syz-executor.0': attribute type 33 has an invalid length. 02:37:37 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats\x00') ioctl$KVM_KVMCLOCK_CTRL(r0, 0xaead) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000040)={0x3, 0x62, "f31824beeb5e8eebc00c52afd63b7277bafb5b99bb62a38bb744eb78dc5c926f394efcd04666bc4dd93fea8ad48c6c489bd91fc5ccc83a53382aec57a8f617eaaaf5b27e6447f7fe4d33cb53bc4595045f92e8d709b2b11742f2428bb99e4cedaa3f"}) 02:37:37 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:37 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:37 executing program 0: ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x141a00, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:37 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:37 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:37 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:37 executing program 2: prlimit64(0x0, 0x20000000002, &(0x7f0000000200), 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80040) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x6, {0x9, 0x8, 0x4dc1, 0x4350, 0xfffffffffffffc00, 0x200}, 0x9, 0x1000}, 0xe) ppoll(&(0x7f0000000100)=[{r0}], 0x1, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180)={0x100000001}, 0x8) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f00000001c0)={0x7fff, 0x7fffffff}) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) mremap(&(0x7f0000fee000/0x12000)=nil, 0x12000, 0x1000, 0x3, &(0x7f0000ff4000/0x1000)=nil) 02:37:37 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:37 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000003c0)="e7fa67d75b063185214152f1455cafb36cfe4314cbedcc9c9dc2ee694046dc80a1280ebc5aa9a84e60ad430105299b9bc491ee48bc168d38154d1ef0725a6ee83a24e5603f511e427efe065f7978309de952d8b2acfc6a93cabd9bd66a34959132764678b0a5fb232b734622fba5fd19fe94dbcada1a79931dd42e99bd834e24295d2b62ae50abf7f27ff6cff35499c814278c67eb014e649821945c6e24817b9fda20f690828a2d99594d07b5f28a80a9cadfc33d9eaf51db9f427b25b351d7f85a", 0xc2, r2) openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0xfffffffffffffff8, 0x0) add_key(&(0x7f00000004c0)='id_resolver\x00', &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000000540)="16b7a01a039c90c0a4572b251ee0a3c36719ee744c69918bc3b985bd87a81c365c24ef433ac91d834c88f72324b9d64d973a06c13546272e8cb468854841", 0x3e, 0xfffffffffffffffb) r3 = getpgid(0x0) fchdir(r1) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000005c0)={{0x3, 0x7, 0x28000000000000, 0x4, 'syz1\x00', 0xf0b}, 0x0, 0x20, 0x1, r3, 0x1, 0x2, 'syz0\x00', &(0x7f0000000580)=['syz'], 0x3, [], [0x401, 0x4, 0x80000000, 0x4]}) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) r4 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000001c0)={{0x8, 0x2, 0x1, 0x2, '\x00', 0x80000001}, 0x2, 0x200, 0x2, r4, 0x0, 0xfffffffffffffffb, 'syz1\x00', &(0x7f00000000c0), 0x0, [], [0xa67, 0x0, 0x800, 0xff]}) ioctl$DRM_IOCTL_FREE_BUFS(r0, 0x4010641a, &(0x7f0000000100)={0x8, &(0x7f00000000c0)=[0x620, 0x794, 0x0, 0x80000000, 0x8000, 0xfffffffffffff002, 0xff, 0xb1d]}) 02:37:37 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:37 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:37 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:38 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:38 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_L='version=9p20-0.L'}]}}) 02:37:38 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:38 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:38 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x202, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) [ 148.355354][T11890] 9pnet: Unknown protocol version 9p20-0.L 02:37:38 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:38 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_L='version=9p20-0.L'}]}}) 02:37:38 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:38 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:38 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:38 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:38 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f00000000c0)) 02:37:38 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) [ 148.694348][T11915] 9pnet: Unknown protocol version 9p20-0.L 02:37:38 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:38 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_L='version=9p20-0.L'}]}}) 02:37:38 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:38 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:38 executing program 0: signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:38 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) [ 148.973827][T11935] 9pnet: Unknown protocol version 9p20-0.L 02:37:38 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:38 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:38 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:38 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_L='version=9p20-0.L'}]}}) 02:37:38 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:39 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:39 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0xc, "eecd3489b787004006e1eb54fa7a6363cd0d836b6fe6a92e9cc6266477597a9c9f32afbf307212672b96e8121b86f17a214a5eafcc5ea542ed2f53a4a2bf5039", "d0e8dde815afdc32faa5f565b1cb0aac207e6976456f930306a4f43d4dae9f40", [0x80000000, 0x1]}) prctl$PR_GET_KEEPCAPS(0x7) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) clock_gettime(0x1, &(0x7f0000000100)) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x6) signalfd(r0, &(0x7f0000000080)={0x4}, 0xfffffffffffffc9b) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x8000000000002200, 0x0) 02:37:39 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:39 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:39 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) [ 149.366176][T11965] 9pnet: Unknown protocol version 9p20-0.L 02:37:39 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:39 executing program 2: mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_L='version=9p20-0.L'}]}}) 02:37:39 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:39 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000000)={0x3, 0x39, 0xd, 0x14, 0x5, 0x1, 0x3, 0x5d}) signalfd(0xffffffffffffffff, &(0x7f0000000180)={0x80}, 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:39 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:39 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:39 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:39 executing program 2: mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_L='version=9p20-0.L'}]}}) 02:37:39 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:39 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:39 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:39 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:39 executing program 2: mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_L='version=9p20-0.L'}]}}) 02:37:39 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:39 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:39 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:39 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:40 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:40 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000280)={0x9}, 0xffffffffffffff96) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x40, 0x0) ioctl$VIDIOC_G_INPUT(r2, 0x80045626, &(0x7f00000001c0)) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f00000004c0)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, 0x2, 0x56}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000200)={0x7, 0x102, 0x5, {0x9, 0x6d6, 0x7, 0x1c00000000000}}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000000680)=0xe8) setfsuid(r3) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000100)={&(0x7f00000000c0)=[0x6, 0x7f, 0x0, 0x4, 0x6d000000000000, 0xff, 0xfffffffffffffffa, 0x3, 0x7fff, 0xe46], 0xa, 0xffffffffffff8000, 0x4, 0x100000000, 0x0, 0x4, {0x86f1, 0xfffffffffffffc00, 0x7d99, 0x7fff, 0x86, 0x8, 0xb4c7, 0x5a, 0x9, 0x2, 0x10000, 0x4, 0x8efb, 0x7fff, "1d2617834b01984207e84e8b7b4c51165e776fcc9658af3cf846380678de46e6"}}) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000300)={0x0, 0x7}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000000500), &(0x7f0000000540)=0xb) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000440)={r5, 0xa4, &(0x7f0000000380)=[@in6={0xa, 0x4e22, 0xfffffffffffffffd, @empty, 0x800}, @in={0x2, 0x4e21, @multicast1}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e22, @empty}, @in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e22, 0x5, @loopback, 0x9a0}, @in6={0xa, 0x4e23, 0x2, @mcast1, 0xffffffffffffeff1}, @in={0x2, 0x4e23, @loopback}]}, &(0x7f0000000480)=0x10) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ubi_ctrl\x00', 0x2000, 0x0) 02:37:40 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:40 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:40 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:40 executing program 2: creat(0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_L='version=9p20-0.L'}]}}) 02:37:40 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:40 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:40 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x6db) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x800000000, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 02:37:40 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:40 executing program 2: creat(0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_L='version=9p20-0.L'}]}}) 02:37:40 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:40 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:40 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:40 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:40 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:40 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000140)=0x2) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x840, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000100)={0x80000000}) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:40 executing program 2: creat(0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_L='version=9p20-0.L'}]}}) 02:37:40 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:40 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:40 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:40 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:40 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_L='version=9p20-0.L'}]}}) 02:37:40 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:41 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:41 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:41 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:41 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_L='version=9p20-0.L'}]}}) 02:37:41 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:41 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:41 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:41 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:41 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_L='version=9p20-0.L'}]}}) 02:37:41 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:41 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:37:41 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:41 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:41 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_L='version=9p20-0.L'}]}}) 02:37:41 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) [ 151.720159][T12137] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 02:37:41 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:41 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:41 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:41 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:41 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 151.932239][T12148] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 02:37:41 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_L='version=9p20-0.L'}]}}) 02:37:41 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:41 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:41 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:42 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:42 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:42 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_L='version=9p20-0.L'}]}}) 02:37:42 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:42 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:42 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:42 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:42 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:42 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, 0x0) 02:37:42 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:42 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:42 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:42 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:42 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, 0x0) 02:37:42 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:42 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:42 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:42 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:42 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, 0x0) 02:37:42 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:42 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:42 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:42 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:43 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) 02:37:43 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:43 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:43 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:43 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) [ 153.446174][T12263] 9pnet: Insufficient options for proto=fd 02:37:43 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:43 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:43 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) 02:37:43 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:43 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:43 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) r3 = getuid() setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000002b40)=[@in6={0xa, 0x4e23, 0x41, @empty, 0x3}, @in6={0xa, 0x4e20, 0x9, @ipv4={[], [], @multicast1}, 0x200}, @in6={0xa, 0x4e20, 0x4, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x5}, @in6={0xa, 0x4e21, 0x1, @loopback, 0x1}], 0x70) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000002bc0)={0x0}, &(0x7f0000002c00)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000002c40)=r4, 0x4) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000002a00)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001e40)={{{@in=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000001f40)=0xe8) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000002140)=0x0) r7 = getuid() fstat(r0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r0, &(0x7f00000029c0)={&(0x7f0000000480)=@proc={0x10, 0x0, 0x25dfdbfe, 0x4000000}, 0xc, &(0x7f0000002900)=[{&(0x7f0000000600)={0x194, 0x37, 0x200, 0x70bd27, 0x25dfdbfe, "", [@generic="63711daba828772f656c3f160b25f171e14b3de9217ae5133e9fc466d7e19cda0b55d2b2fa61289dcc65067e0058d51c824dfedee691cb5dd88ec5d0c3740169efa8a50351a29fd6e0ea3a3f6ee665ddb6cd5be5a76015aad5b3f20e359507474f42c00550a0a5fb8fdd4d7b222bbf3d04a9b7ada38a1cbe304729895e236a542d94209af8df0577720902dbcfffc7c3e1", @typed={0x8, 0x31, @fd=r2}, @generic="bc6ae87005b840d58e10b3ba8dda743ccbb9c369e49cd6", @nested={0xcc, 0x81, [@typed={0x8, 0xe, @uid=r3}, @generic="896bca801c71023f256dbe17277c8aabd005ffd28b6fa0fc47e755e66e37961b3b50bc5beb710246cb8a810d33c1e8c2ba5dbb759e7592b87b94e3a0", @generic="32a54a7e06b7ef74d416de8d1c06680e98da8f74848d203487f48632ccb6333ec01267fb0c3628782a8984d3c0a53289b31d3b31c6e3eb16b825ff80eda308e7085c8a97e0f5c69932a29d7c0b687c68c5a64634e77dc950e17dd05723ea676771f28cce2612727ae4247b8e0f217ca1d34e5748893456a18fb3a21896b7f09d13"]}, @typed={0x8, 0x8d, @str='\x00'}]}, 0x194}, {&(0x7f00000007c0)={0x23c, 0x2c, 0xc447d4b7288c539f, 0x70bd2d, 0x25dfdbfe, "", [@generic="bd5be104eb5b20ef6debb41e5dac5d67d160f1db7cc432bbbc1d613108ca60b1715596fb99bb506db942043173de6380e186ba6afb1e6e0a847e8bf9657918a5128d76ee8639e40ea483085c233e19797719df68b5d92e8f0bb305063eb8a1368a677c3477f3e3a7e16dbef62eed090360abd885aeef7e712d2bf9a1f0bf71eadef844ede2d3b2b646368feb08834c3410149cb051c27d7a2943aa28151a374d759ba0a306e6377b7ddf869d854d8fa6646bad0cc819a35c3650835184", @generic="d6f90bce7ee78ffc31225a74a1edda796214270cfe35c0903859a56a3956c67efe1433dd0320e2dde19a746c9c8a34d81574eb", @nested={0xf0, 0x18, [@generic="d09eb819cf945f872645544528e8499db02304e6e4402856b04d848e86adfd6223d070d33cc0db438813035c01b4bdb05b54ddcf85048f39d30cd8a1b309e9b4b4f191944047456f5b3ac348e770953c7f9d4f2045861d26b20cc6e931a43850540a448618da9aa853a964d24b3cb032f52aa254e799a67a3308149f84e672b899d908607d63f44fecc659831267d886daad3b9a542f5ee51a7d40c844c3adf0460791cc8a3b26e47af80f0de4eb36974ddd97f4a258937bbb4e5a0bfb8d0694e66936d9ef3b2dfca198e3681c3985c2d2179bd10541f7f712198105e300a72aa1f8b594da0bf715eee590"]}, @generic="72205f220895f529a39d52847b5ea5dce8044fda1f495c69a0eae4680451e77db5605cc32b863fe107da6b4bc1e2554a64ea70fe7a4c701997c9e664f09d253d9d9b76fec4dff0f7c5"]}, 0x23c}, {&(0x7f00000004c0)={0x24, 0x18, 0x300, 0x70bd2b, 0x25dfdbfb, "", [@typed={0x14, 0x6b, @ipv6=@mcast2}]}, 0x24}, {&(0x7f0000000a00)={0x1d4, 0x2b, 0x0, 0x9, 0x25dfdbfc, "", [@nested={0x138, 0x65, [@generic="d5397a5fc3ca788263597145e47c78e1f12cec3bb189db6943f3be0148256801c669bd2071343f15547386ac151322a3d7ced74414291a4c76229cbb1801297b0f9746140e5e9e2bac6ecec3dc0a0cf9f7adb10fdfbfe815a9ad595011f0eb83f45fb10c51452ccd758f18293ae15d64a96dd5bea939fc10da19cf6402fc2b2a77abb446cc56248243471ab887a36c90b99333bc3655bec996d69c6e1c57f6373e63d313a2596e4f585a1ebe95075e94641a7413f8bcf417a8e03a61163434ff73992652", @generic="8492a6ea9c2c24f2e4b09648991496288f58cb6f30def0500512acfe23dd724d87938b9bae7e2805f1746628f8a7f53dd728e0666cc87ac1056265c035063ddfba2802c08efe23b9ad79c7ca0f9f0b10e8de9d1db92d5511b4618e7c0d8038a6011b4fbaa833ed5db855d1ad43"]}, @typed={0xc, 0x51, @u64=0xaac5}, @nested={0x80, 0x20, [@generic="e214e9a0a6927253ed1772c751d643e392d4a4e84b630e1ecd3027ee2195d49ddbc9fbf07d978c6b10486d9f250d2517f4b18605c96002cc77cb2973db5f8f02bf11e1e18d3607832123db2a83d4c1282f63d02e04c1784db5dbb057a1511cfe21d8361967edad51833d3eead605df797ef386", @generic="216092692d5c9807"]}]}, 0x1d4}, {&(0x7f0000000c00)={0x1208, 0x2f, 0x400, 0x70bd2b, 0x25dfdbff, "", [@typed={0x1004, 0x89, @binary="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"}, @generic="402188604fe39f4f5b9583e0f1445c1518a60c69a85cbe298eb64642122c8228ddd01445a692a46c37bf65b76150415d423126b078ef239eb44c7876", @generic="9a211e261eb76bfc03495b0e87f9ca474ee6196426cb40db159d3bd1c556b7a71a3264abbb06", @generic="f69d21d07e6c78f86741d064b730cb7bc0ee5b9997bc92c5f004734e7b9afa5547a45e0031830f493cd40b6036e914e11bd9caa475839a6b73a2806b3a12d3f50135b1d09ca3fad01b9e44e18166ddc538c8cda390060bb4553194adb142cd59a57eb927b3fb5c042cc66d61a4a02088ef970922f8fb27b06f535536c99ad2826694f67981946fa8e9d852659bb91e16a9ee8aeb2e0df50ee328964b7ef2e4b50bbc1e957513d450dc4a7fa7bd89887a3a6f7aa73bf923c63a9444c4b9734ab4c1c5ccbf7c7f5a7d388fabd949d8ed32e433904daab3f4eaf7a6de701e81a78e5b59854c62", @generic, @generic="c70b284d56c685227a28c1960f0fb927eb0692cf8dae5b8f3c2423ed430d2454549a20379d5da8d6401d0e2834fc74148ac8484d42d65e83019d5d97d2935e4053d5190553c3f03181ffee993ffd66e22d05a4be9e4011de01a5a76f9da51f9993d7b22dad59a13be8236da9bd744af5d2647b34611cd837a33d2a7c68bd6500490cee961d8d37cc6adf913cf01c1c5e1a4d549a11bd6bafc6af01f3441b3832490605e77bd75df855ed"]}, 0x1208}, {&(0x7f0000001f80)={0x1b0, 0x3d, 0x8, 0x70bd26, 0x25dfdbfc, "", [@generic="615940e56c8b3035437ce4cbfa52a7d980ece9359d4ba411beccb68957fc1d8395a5a53d832ce9394aa65c10aac57ee95a546964b48700c06f9473b2f5cf8a1729aef28ae399820bfaabab77a9ec496613bf85d7afb51c", @typed={0x8, 0x7d, @u32=0x800}, @generic="fbe73f8c6e5cc36038905e6b6a6622248c79ece7018f4fd488b8c4f8b8f1ba7cf7bfd21d4eafd2772b4c473d8059618dad6ee0b95cda11d635b84cc2a20250db9f655797244b7a71b9559c6611ff44afad032ff7f5507772cf5fd0ef6d6d31b47be30644ddc1ec38fe", @nested={0xd8, 0x3e, [@typed={0xc, 0x6f, @u64=0x507}, @generic="882d95f8e867d60a1dbd8bfe347f3b09c3305f6e700ed1461af3ed247c8ad73abec30a5cb6441132f992dae49c6dbb915bc9d27c1499a4f0a1dadb589f39f0ebf296042a154d265c7e4fd403c572b998506a1867497748dd1e4b3e617829bdb2ed1f8d3c8343672e182ac8833425b21967f1a10de24b1144fae0dc4391787d2410b41a21c323845abffbb2d3d47171a1ec110aeb854863114593430e217b425b149b37d65b3bf2639b8188200c29e3d4", @typed={0x8, 0x18, @uid=r5}, @typed={0x8, 0x10, @fd=r0}, @typed={0x8, 0x2c, @ipv4=@rand_addr=0x101}]}]}, 0x1b0}, {&(0x7f0000002200)={0x6f4, 0x3f, 0x1, 0x70bd26, 0x25dfdbfc, "", [@generic="802f7b1f8a87548aeb715003a2a6db2000ef210732959c1440666e8aebd8cc374763ffdbbb9a170e0629a29b99a6612e9113e02f7fae2a27412279d46f58b5dd23ebe1e0401b104de447849be58027026615a68f0605684668b8cf72e45efd8e1900fa6f93342d59094f79cd22f0cf97645ca7ad4f2e7859f3e7dd8a427f96b555b8ad92cde9", @nested={0x280, 0xb, [@generic="0fe47e36f08b4665735039d064d1b527b6c0164bcc733e4a2a603fd5756f952d3398b6152d3ae50c25c4920c685d509457fc9cb25d560bb8a1a471a4f12f528cb54c0b50b82d594ced33e83885aaa04964dd51021d285b31d524ae933d48a5445cb33608d9451ebb7f2a08873a6d54c363f21fdb879efe42028f5cea63621f95d2b6aed2cefba5c6ed69b3a51fd0adf251fe27e613870fc53e795845fdebc24606", @typed={0x4, 0x30}, @generic="1742653699b237666cc341d64052819047bbdb29cc997a7a406c02bb8a44c0f213da0f420e", @typed={0x8, 0x64, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @typed={0x8, 0x64, @pid=r6}, @generic="cbbdd46732abd06f0e85a3cebd680d67829e17865aa3aeafea9816eeaf1017a0df7ec839ec007bcd6ec86deda0381961594ad07d1edcf2ef70d5d70649399326d07ac0c312712d7cc429cc64ed", @generic="27bdad3dc93745d13597f97d19edae6adf20ad17b85f328d1117122fbfd1c55185960bda27e60c9ed676420887019501d15ad745d69957e8925f224108d8df32c6ab7cf4898a6c44becb39b8ef47a342c4cc7ab98d973cbce0fd24f38275582f", @typed={0x8, 0x3e, @uid=r7}, @generic="3327ab545dc081fcafd2432fb3b70bcb7de212dddc8a34e2fa4570ab564f91e55213184cedec7a82e2e01011797514beae45d67362b4dc096dc1f2453200f69c9ad34ad9c4932371115168dc0bb9afb646b5f035880ae364f8146ceae47f3f2a15930de7272feea97fabd40dd7d28865ce9dbd3d5fd14a47e5698fd1a4c365fb67346f078b2cbef7cc600f451568696c328bc31498606d8ff20adf5eae38842fab960a05fbcb3241a46e812aec2055038a93cce68c81c5ec055d079bc346bf330bd031e2df9f581c58929e84b82e518e3bfb5a37515293948e2c3d1664a94ed677a02df651e35839ac8094c7e9"]}, @typed={0x10, 0x1a, @binary="666801ac6d2dff1ca94789"}, @generic="9251f91f639d607eefc38396b7bfe017ce668015feae5cd2b8e796b7fdac382634f96c56bfdd5f5723cc6c5e4ad9afc18802796c15c07a2c4f245741fc0fd9f44cd3f78bf86a676360dcaa8a2b46246b2dec7a35768634ef2248717b7a49fdf73e07567b155c48676a9649b2ffa9371320791643f9f4e53495e1d2e00688108b8b00744ea5c789c9ec8b1be0401b5dcf45971ee4ad471439dc401167e256c97af6", @typed={0x4, 0x15}, @nested={0x16c, 0x8a, [@generic="d0d0f85b39d32dbade4d5fa8d819e122b1227ca508e929d9eb42290c5f48caa07e", @generic="269b3f35baf4b5eaeb542ee194a7ac3727736ad006a48ca041dea202474c7d777da3fa3f5e", @generic="7142289279ccd593eb4f1061fba364acd1643937b8668222a6d7bf98c0499412fc0a8838c91777b3cf70ecf4db69f9c5e7104c759c1303c99051cd4e07f0e82adfbb883f6ccd0f734a52da3e38ce90aef5ed34579a8a0c30074bad42d33d701c2eec8251b2d235264e05ae2bf73dafb3accba7419a7a82e2369e7a2c1af4308a8fb80eb294796b543494e3927e4d7d45a74f9c64249c3765e074638d6e21ae74299e", @generic="eecd759a72c6bac18f635e8e762433f2c6ec7e5651e3535bf5b691c51cec3ff06e8e36ba0b1e749f48dc304c9b7edd89e692843135a720a54c516f22c7b137d20ace14bd8609ce27c5d4139824d95d8c2ab2b232f2a6ab757525", @typed={0x14, 0x4c, @ipv6=@remote}, @typed={0x8, 0x73, @uid=r8}, @typed={0x8, 0x59, @ipv4=@local}]}, @nested={0x1b0, 0x40, [@generic="446d04b2c925a05cfdc0af8a260be1fc7e7704feea94201356502b8b29b63f887656fdabb87cd089c7af11934eb2475e0ea2e8c72bc4113abe861bdc49540a9969ec23fa3ed460f1aa06728a2bfe6466e7e02d104d3cb41c6d9da050323a01b9d1ac50436ed7df5144", @typed={0xc, 0x92, @u64=0x8000}, @typed={0x8, 0x21, @fd=r0}, @typed={0x8, 0x77, @fd=r1}, @generic="109e7dff88f774d40bf98bb90220d4d1406e3c431baa00a0bc2bd6142547ca150272c44d9277653d6a361c6adbea14121b35f7135084c59b6ecbf8a1000c3b2358d4a7ddcef18df963701b678403768436523731b94734a365f80c47dab37e1af006a19c65936fe499a1312f9f34d272d9e755b32d2549dbd67200a487ed065ca16ce16f83cfca2d", @generic="528c6d575f74fc1afe3d49ac78b5c893531da382151b62a60d0db31f353599144bca0619c980b47aa760ec0ea64cbb90a315136c814c385d10ef193d59b69117bfffc71268307832fa5e552d9d474d5828909e08102c1cff2b82a6a56fff3af67269518ad1314e0c3e696c0c2b78c9cf6d01851f55caae4e9e0f67fba87c92aa1b2b5907206a473df82ba2eba45f9bb1996b969a4025750320d69af77ee6"]}, @typed={0xc, 0x14, @u64=0x3ff}]}, 0x6f4}], 0x7, &(0x7f0000002980)=[@rights={{0x18, 0x1, 0x1, [r0, r1]}}, @rights={{0x28, 0x1, 0x1, [r0, r2, r1, r2, r1, r0]}}], 0x40, 0x4000890}, 0x10) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="f1fe0000", @ANYRES16=r9, @ANYBLOB="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"], 0x154}, 0x1, 0x0, 0x0, 0x800010}, 0x14) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000002c80)={0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000002cc0)={r10, 0x80000, r0}) getsockopt(r0, 0x5, 0x1, &(0x7f0000000100)=""/123, &(0x7f0000000080)=0x7b) 02:37:43 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e21, 0x2, @local, 0x8001}}, 0x7, 0x1, 0x3, 0x81, 0x20}, &(0x7f00000001c0)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000200)={r1, @in6={{0xa, 0x4e20, 0x1, @remote, 0x6}}, 0x1, 0x6, 0x7, 0x401, 0x2}, &(0x7f00000002c0)=0x98) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000340)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000380)=0x24) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(r0, 0xc038563b, &(0x7f0000000300)={0x1, 0x0, {0x1, 0xb53, 0x5, 0xffffffffffff8001}}) 02:37:43 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 153.693470][T12280] 9pnet: Insufficient options for proto=fd 02:37:43 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:43 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:43 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) 02:37:43 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:43 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:43 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:43 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x5a, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x0) [ 153.956031][T12294] 9pnet: Insufficient options for proto=fd 02:37:43 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:43 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:43 executing program 2: symlink(&(0x7f0000000500)='.\x00', &(0x7f00000004c0)='./file0\x00') 02:37:44 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:44 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 02:37:44 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:44 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:44 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:44 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:44 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) [ 155.566968][T12342] IPVS: ftp: loaded support on port[0] = 21 [ 155.915220][T12342] chnl_net:caif_netlink_parms(): no params data found [ 156.014201][T12342] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.021554][T12342] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.029211][T12342] device bridge_slave_0 entered promiscuous mode [ 156.037360][T12342] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.044527][T12342] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.052749][T12342] device bridge_slave_1 entered promiscuous mode [ 156.137785][T12342] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 156.149195][T12342] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 156.236875][T12342] team0: Port device team_slave_0 added [ 156.244533][T12342] team0: Port device team_slave_1 added [ 156.312872][T12342] device hsr_slave_0 entered promiscuous mode [ 156.361010][T12342] device hsr_slave_1 entered promiscuous mode [ 156.399817][T12342] debugfs: Directory 'hsr0' with parent '/' already present! [ 156.440621][ T21] device hsr_slave_0 left promiscuous mode [ 156.500108][ T21] device hsr_slave_1 left promiscuous mode [ 156.580743][ T21] device bridge_slave_1 left promiscuous mode [ 156.587400][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.641993][ T21] device bridge_slave_0 left promiscuous mode [ 156.648169][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 158.503967][ T21] team0 (unregistering): Port device team_slave_1 removed [ 158.518291][ T21] team0 (unregistering): Port device team_slave_0 removed [ 158.533172][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 158.604480][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 158.686625][ T21] bond0 (unregistering): Released all slaves [ 158.823672][T12342] 8021q: adding VLAN 0 to HW filter on device bond0 [ 158.836436][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 158.844955][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 158.855833][T12342] 8021q: adding VLAN 0 to HW filter on device team0 [ 158.927512][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 158.936914][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 158.952157][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.959235][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 158.967337][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 158.976281][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 158.984891][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.991994][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 159.003924][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 159.028224][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 159.036971][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 159.053231][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 159.067093][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 159.078184][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 159.095787][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 159.118545][T12342] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 159.130549][T12342] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 159.143414][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 159.152333][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 159.167948][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 159.176954][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 159.192376][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 159.217847][T12342] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 159.225471][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 02:37:49 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x346) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:49 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:49 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:49 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:49 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:49 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 02:37:49 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:49 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:49 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:49 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:49 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:49 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:49 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x400001, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) fsetxattr$security_evm(r2, &(0x7f00000001c0)='security.evm\x00', &(0x7f0000000200)=@v2={0x5, 0x3, 0xa, 0x31, 0x6a, "2776180b13f825e0b0b81c4003b7f1f37e6a8b49d05a36fbddcbe88e7ba65c0d0f7e3d79d0f76fea552a04e489b865d91fb240e2585fec7dd0ee06989a477259701f50510f5a2bfa1d580387bee23f74ffc4b9e75fc06cfe966a332fab3d87352b30382a2ff662511e9e"}, 0x74, 0x1) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$UI_DEV_DESTROY(r1, 0x5502) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@local, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000004c0)=0xe8) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000500), &(0x7f0000000540)=0x30) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x24, r3, 0x0, 0x70bd25, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x4}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) 02:37:49 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:49 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:49 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:49 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:50 executing program 2: setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000000c0)=@ccm_128={{}, "2dca7fc1102c4f1e", "cedf7ab0deca820adbbecf6f38f21f2b", "ca8f79dc", "faee5d787dbab884"}, 0x28) shmctl$SHM_INFO(0xffffffffffffffff, 0xe, &(0x7f0000000100)=""/26) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f00000001c0), 0x4) accept4$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @initdev}, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000300)={'veth1\x00', {0x2, 0x4e21, @rand_addr=0xffff}}) open(&(0x7f0000000380)='./file0\x00', 0x40000, 0x0) fstat(0xffffffffffffffff, &(0x7f000000a9c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f000000ab00)={{0x2, 0x4e20, @multicast1}, {0x1, @local}, 0x0, {0x2, 0x0, @multicast2}, 'hwsim0\x00'}) read$eventfd(0xffffffffffffffff, &(0x7f000000ab80), 0x8) accept4$inet(0xffffffffffffffff, &(0x7f000000abc0)={0x2, 0x0, @empty}, &(0x7f000000ac00)=0x10, 0x80000) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f000000ad80)=@gcm_256={{}, "be4fa09fb14c3fe8", "88da77922a6331f5b7840f20b09427fc59cf922c2bebe4b3cb8c24a5bbc98bac", "d0b1eb86", "190ea872c5c96e0d"}, 0x38) 02:37:50 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) setxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xffff, 0x3}, {0xfffffffffffffff7}]}, 0x14, 0x1) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:50 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:50 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:50 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:50 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:51 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:51 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000340)='/dev/snapshot\x00', 0x4c000, 0x0) sendmsg$unix(r0, &(0x7f0000000440)={&(0x7f0000000380)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000400), 0x0, 0x0, 0x0, 0x1}, 0x8000) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x0, 0x3ff, 0x0, 0xffffffffffffffff, 0x0, 0x5b}, 0x0, 0x0, 0x0, 0x0) ioctl$FIGETBSZ(r1, 0x2, &(0x7f00000000c0)) ioctl$SIOCX25GCAUSEDIAG(r0, 0x89e6, &(0x7f0000000100)={0x8000000000000}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) ftruncate(r0, 0x10000) 02:37:51 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:51 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:51 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:51 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:51 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x3e, &(0x7f0000000140)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev}, @icmp=@parameter_prob={0x5, 0x4, 0x0, 0x0, 0x0, 0x2, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, 0x0) 02:37:51 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:51 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) 02:37:51 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:51 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:51 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:51 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:51 executing program 2: syz_open_procfs(0x0, &(0x7f0000000c00)='net/hci\x00') 02:37:51 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_GET_CPUID2(r0, 0xc008ae91, &(0x7f00000000c0)={0x4, 0x0, [{}, {}, {}, {}]}) 02:37:51 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:51 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:51 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:37:51 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:51 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:51 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000011c0)={{{@in6=@ipv4={[], [], @empty}, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}}}, &(0x7f00000012c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001300)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f0000001400)=0xe8) fstat(r1, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7b5cff53, 0x1, &(0x7f0000000140)=[{&(0x7f00000001c0)="7456082d5c0f8456b3a0610df9ddb62dbf9128aa39e0e856e6f6c426cf9a0c04c510366fac38166b2886f5566039f2b695831b00ace5eaaa2a9a056e8a90ca5c8548fbd5879f048cf3a3649e91f5fbc6fe9d501632b0027b29e24f865ee8eac52f0fa8b12ed2b6de1843ffa4f1cf4b205c69afad491ee95621c124158d682cfc2e64b764d440a3e730564b2aa7073ea6dcf14fbf13e00ba5753e13bfc90c0e7eff2986023271d6b43fa787dea692bae3764fae4fa25f56f625de23e541e4fcf02fdbe483fd8a461c9329f8843addb8c70b0ef904d665b1cb4cef87cff101d6bb78a65983f726888b8424e0bfa233424bd55173c624658f9ffe03b527564ce3bf0d4e51c1bb36bbadb275caae1612078adc4914052b0282393edfd9e3b8d85972da85c652c525c35eaae971c2888c7332e116326bb892a390e9468d4200bb1e990639cca948b729e8eeee5595a21e1560ee8e94e96757116e31d46fb4e9fe168e57022668ef50d04923b185f1a1fc7a6847bf5a63c2f45f1457ebc6ba1a20792c01447870ac7dcaed7c0c4fa3646f1d2a8418e79692636d3c08a2036280878dc44e73ab906a035764e2a1ec69c46538064c60eb0f5a849b6a67bdd69bbea0780c880fa0a75848c8fada37b59a1ec0a8d55ec356ee2b07eeb4d9422aa3b5d03b6c9dfa2a6a2425afebf982002e05514ebe5e2279dfdcdb77297bc883ff20158940a8159aa622fd326a3b25625aaf47b806bc318a6f09415fb2768b722131b2eddd59b0291665d7b147560fe2198780d4a7f0f640fc39548c5e8ea798100122d8468b71cd8f971fc490cf5f89f773eef911782b49dbbff6c9a042c9fd4f9f07008ab7f6bbf0f9ebadc50f93e268919f2cd61f7fac6049d7a6b63fe8d7548cad0140797d2f079bd85f889a4d4226f30dd70eaf1c4425559728f588827bd9332ecca27380ee6f3697f060df6d4195587b4e8c619f8add406d7e804631274a52af2a6816f4121ae11062b3ad6762c86b0ac1d47538bce9c5429feabbff4d42024abcd63915272b2ecfef1e0a246dd2aaf377185eedba3d4a2fcb25290d42c93b14cf4ee7e525ac50b390b6d002a72a92dbf9ff8f56643c0678f458495e0ba43fac37e7e2a1b587f94f5ef3dc6e10acffe979f8ec52b5ff7b17a3fd36dedfd41b5d3b4c4e4a793722c1e011826e673a43436eae97ff38f2f526bfc3938586df4456ae0760c9ec04117ba47b160d781461a791dcd3cbfbe7f37b25eba5e8769a41eb12075be6d272850c3650a0b0ab5fe1ffdfe257abe9e89a3f6849ce288f42e212a7dd487bc68cdc7e7f16e3de181ef7498fba30076a55c6470622354e212b946e09a58e8707792e11b6a231cc22c947cc1772277157d40e4124ba9f74227ce8e436c218eea96967902f1cf70ba2b1b1207541ef20acba8f9b0bf7c10e87ed5938b7c68c0a7d2440a194adc61577072e741a1bafd3f48030ec1ef774a79e66cb0ae7820f2ffebd85cf73cf8ffef82964e78196aa388fe08fe80437360611c57d3b5617f316bcda252b039c80360ce526691b9a6fc829561299eb5bd9066e8850cd8316c331a55af02891fbe8f6e03526fc5c6b38ea39f546712d1a06892fa9c74e84eb8dfce261bea4c27cfb8802fd1a159203fd9ce20bc7126ac4f838c0ac82ba466b54243b81085ecf38a857200231db241f0991578583a51fc2dfe02db825f8d346b0ecf76341740d16b517b7b2cbc14529253be85151d4c7f68a0921af77490d91ef5778f2ad6dcabf07e19b158abff3e6df5c14fe008f85b89e73e4d5e07ec2e8c2dd8fe2527ffcea6403a4df69a7c4196517e7be92bf21dbdeee60c9b659dc3110c1edd690929fcc5ed66f0a708cde5dbacb19c3ff25b92fcedd40fb7421bebaacd264beaf7e060f5ba3d9bcb9f554b405ad530709f0512caac30047f9f5b8038095747a09a350bc5e803100634acc136d286eacd3e480da59f49b20e15ee33f0cee723345a464098817352e934046713d42fc5e7961a2f95adb5d1d5b5662e14d76d405cda723ed335f7304f0f068dd6a8c1731a7c72163be2e366459dfe284e9f6966800272135cf58f58e5fb7d4a612acd3ebdf665fb2fe2bb1f89ddec8a00ff7ae6d5d882567a6366903af562b643dd93f133216b698e897247d28329d3b61a5e9f07d80a66896b792dc1f6f38f3ef2c32562a58a23139862f394e724c53a16d9116cf496153a701b7a796cecb04a26895fb18b54d3f40805357efa64ff64b633481542f41b13a718ef21be963addb588cf45abb76c81de29032f570bbe1be83d294a89e9e174221ca2ebc141167d77415a466289ac463fce6fd0a4bccdb426be5f47b46b410d8511e000763f48e779cce021b49db9a109adcb36ae9583987fa1c218a7cfe233067c0838777f1d1a976cce79fb802fcf4a2e7c3d174072b0f10e6075938c20a5a9e645d60b64b1b6f22ecdcda2d4227befe02bcdce4a361a3f50e9290a1e35b3b0129cc0e30e1c53df2027580c84d1d9f67e3ebbdf5c27f89795a4771014e5fef089955594c52a6cdb92a6d969d428649c36fb8d4f2b6e9e0e78f74ca376e5749f039fafa939c718f89bee2eb973fec5dc9b02ef0a35fbb5b1a5b4269e2745520dc96de16e28c2e5360623511d9e7e0241e476e70ded1258b6b3bde7357a6dbcbc2c2f9daba8a20f8a6416453ca797c05a2ea808898452228c44ba53706f4f99bd2075689e9a887a75c2fe419357583ed194d9221c61da160dc5b7e802158373de95796a8be9e5de7db012612dba9a9e630afb9793f7a71661df0d68af074617d26a34b0e9e8774547dbcbaecd9131cfff5be46bb44f55709e25631803f37cb3ff42d95fd2355e0a49f5388f4329a3d36981f842370112e3c11f8d01da3b6817d126cd3dc26d32d0ba0aa020f93650d8d266cf3353cd13b9d64212a95b8d211de3e52ce70a999c896b3d26eda2aea6d82fae9d7d9c234ac693ef71c6b10fee622c6cc60851c089c959a2e8d58207a5dec4559bf10b41eeed33d51e0b5b7417d97b7fb66dda9d1c051bdc165371588df62fafc116c260d2b8e8abc11adb51e207ebd4a804e539de78abec0635a8545357aee29f6fdd8e0f4ebdcdd83135ae6b0f47b0b687c8574f8f9edd0b53af7e9761ace1c4c0764a05de0b96faac4b1f3ebcab15f6bcd8aa651e67bc256fe24b5d75d6423ad96da7acadf39713800a1e9eb6e1df5c6a9b0d26df4d8e4717b5cd948661ca8977f555ddcdac1c1de04f356cba5f71ba7fb1441baa508f8978820a0aa2364d63d47e352e23df2a8033bd19ebfacf284cca98058405e8940fc58d7e09110e0fb2fb3130b3cbea4466210be85256facc7f707ba87719f6bb477e4b82e9e4e06b28a55479c9215efe29f8ea77f6a65869bb30b625beca7feaae77df73e8a41066fd0589493b1a7e1328c9da66dd2d09bf5f6a508989db44c6da7a8eda27be92feb3b24ae0ff801e5002946cfda661111cc40d88a0734544d12ef5cfb3b0bcf3be97c464daaff6334cb440ce0d3b539ddc8f60691849803211dc3753e2ef98db531e70312accf163221fa5cf31e50aa65bbad973e6122260f1e8b6d7624d604bbb0178dc651334a4f576593d4931731bdb251561db244b8dce8d4b9ad9c3cfb54b194e77686a8d896df8287fd811dd1c6b0e4dccf57a660faac95dc4eee9db46b383f109ed86122b4bbc13b8fa21f863d76f95208f3b0db112c3a95abfcbcbd8f30ea6719e9c383973cd11a9b39abb0bad98eb02874a733c0f2f133f3b50d91d179d1efdd9ef850c9283fa050091dc993d5df79f15c29657a500cb68713f0ccb972ceb8d9b501dcab68d8b8a7d3c542b68f70572c4ba49330725949c02cc6ab6bd0ddf5f779da71a52ec7a79e78d2c2caa2c725180efbbd259a025a95bf35af35ee341d14bc1222c033cb79935eacb6d835803ba1f9378dd6957c7fa228983ed45bb88577334dfe049231e65426185210232c9c01bf4b201a05915c7d4baee64e09b9b5f67a93fd2786ac85ad9967ee5bbf7f1f8dc86d239aecdea73cd5df82f47446bf569937dfd233ad36c63a5cbbaa32e1f0e30bcc3a0726371e15d8083b2fd4f54eb0e5ce719def312eeb76a1b4d9362bffa9d48ecc7b2fc4f1bb455c1087f82171020bb29adbc32ec3d1b361ff159e2251471dfd8290c6811680e219fdc5c288f2852e1bceabdc61cb3cad839c93b17988404b546d90234d90e64522cbf540e5b8f4be609475cf0101c82b924c471edb4050e321d81b8dabbfe529bad9329afb5bb9c9b6ddefb237a9c86790d0a42b933db5b1715f9068dbb81b0f48dba2135a2e4a9afb1c8e00dc4c590839a90b1534438dab879a10f3ef2c2160f6543c8c6a7a47012380ec5f11713032848bae440f4a3a8e7eb41bebfbeab3a6271c1f43c391cc5dde9f449449d1c58d7f443da10b852078c046fd5da1245a9c3f176bc2bfa84117561c916cb90bb12c0ac6ed802a1201f49daa5971a9dfcb2872f5656e1da28551ac24acfeb7c272d81723c06bd5f0c9a86cad47709f7db16e67cc3754afc12aa940b23e520111b99f685674be1590e635092cfbe6710cc7f96b12cc7d19937204ceeba9623de8ca92f6dca583f10e2d9bf121866703f4b6d6bc64c5180eb8de4833eb015a2dfbc902f24eae1114edb8e32e302efc68bfbdb8344a4272e46df2b78d1dc86821838ce052fe6b136b8679ee2d2b8fe8499c781fb4a57ae80a2bbc671d2cc9d89a8da5f323c0f704b2828843bf491aefbaa73165e2b979e26124074cb13ee8e6648f49605dff529f7e648b03eab535c114ecfa5ecb549ff62783b86e77c4d92f43f54b73ef4f3b985fc1688c38702122c837565f1358cfa635208d94f2c53006f757783216cdb5e48dab6af37547118aa5f498515b0b97062a2b8900883ee0f4a666b70d2912fe194593cdf6e347d8757016e9c2da972a690dc575b5a7a61c2c155d8368ae4549f87dc26701d14a1a6e53f82e27a27dd5c6f5f319df36cde4b42ad4a818d5d102e86a56d6dccbc4b18271addde200b8113604991bd3b1da0d8fc7a56d4054c8fbbcfb25b946251e4015f907c8aeac473f50cb5f45da82a3fb90e912c80b6cfcc456285a0fdd4038ba749880b660cc555bf25f6b4c3f20aefb5298820fc13687e50d2017d578ac42a7c49f7f9e923c0013accec9fe872078b5110d6df43408d769d439b42f3f0988b8c85c645641c82bdba512a6c28b0c25d03393f969dbebc19cdff16faf0b490db02cf1aafea04f3511787659084892b9dc5b5c6b81179698aca38b4ba44a47859c81180102f62495d5bec286ab231274b392812243f388c718557c0fb913600018c60ce085f55e13b3679a021414267d48d231c6d1454a62e8aab6bf9c858c7d3d8431db4310e40d26b2a99400178e0916b2932b4c4638747726c7ebcf2500acc17f9b8f9fd8532146144f6d298732cf807efdc399be8b51ca305ff9fb37fb090bff85a0e8856f3114d30f07a343c84293e7706182a9ae7a676fdf184e7b704eab6411553a430b79faca7b12cf639674aac8472b60f191a7137e3347b82cb3af61ffae858da9d982c07400f51c4c6cd261535502587901bf2f8d289bea81d527148bdac55e4c9564a4fe03f8bc614a32f314bb3b0b5b9fa1d590dd025df3fdc77bf04756c94d6c368ed42744b91b0f20b5df776374f2455f2d357f2a13e39434967cc9d882564b586e4d7609a4abd891070f1d85129bc313f8401204f5895b3708edc6c9182c50e26913d640c024c4", 0x1000}], 0x15c11b22e2063e58, &(0x7f00000014c0)={[{@space_cache_v1='space_cache=v1'}, {@rescan_uuid_tree='rescan_uuid_tree'}, {@usebackuproot='usebackuproot'}, {@noautodefrag='noautodefrag'}, {@check_int_print_mask={'check_int_print_mask'}}, {@check_int_data='check_int_data'}, {@enospc_debug='enospc_debug'}, {@compress_algo={'compress', 0x3d, 'no'}}], [{@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@appraise_type='appraise_type=imasig'}, {@uid_eq={'uid', 0x3d, r2}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]lo-md5sumposix_acl_access^'}}, {@fowner_gt={'fowner>', r3}}, {@uid_lt={'uid<', r4}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:51 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:52 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:52 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:52 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:52 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:52 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:52 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) setsockopt$ax25_SO_BINDTODEVICE(r0, 0x101, 0x19, &(0x7f00000000c0)=@rose={'rose', 0x0}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) [ 162.471343][T12485] netlink: 'syz-executor.2': attribute type 6 has an invalid length. 02:37:52 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:52 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:52 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:52 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:52 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:52 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:37:52 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:52 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:52 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:52 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@mss={0x2, 0x10000}], 0x1) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000080)=0x7f, 0x4) splice(r1, &(0x7f0000000140), r1, &(0x7f00000001c0)=0x75a7, 0x1, 0x2) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x101000, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) 02:37:52 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:52 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:52 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:52 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:52 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x2, 0x305940) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x8000, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f0000000300)={0x1}) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f00000000c0)={0x7fffffff, {{0x2, 0x4e24, @empty}}}, 0x88) openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f00000003c0)=0x9, &(0x7f0000000240)=0x4) pipe2$9p(&(0x7f0000000040), 0x80000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000280)={0x29, 0x0, 0xfffffffffffffffe, 0x3}, 0x0, 0x0, 0x0, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/access\x00', 0x2, 0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000380)={r1, 0x120000000000, 0x100, r1}) 02:37:53 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:53 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:53 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:37:53 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:53 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:53 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:53 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000100)={0x60, 0x0, 0x7, {{0x0, 0xffff, 0xf2da, 0x5, 0x6, 0x8, 0x7fff, 0x245c4c92}}}, 0x60) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) clock_settime(0x7, &(0x7f00000000c0)={0x77359400}) 02:37:53 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:53 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:53 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:53 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:53 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:53 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0xfffffffffffffdfa) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:53 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) 02:37:53 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:53 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:53 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:53 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:53 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:53 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x1, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:37:54 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:54 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:54 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:54 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:54 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) seccomp(0x3, 0x0, &(0x7f0000001980)={0x0, 0x0}) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f0000000300)=""/190) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x40000, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x0) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f00000002c0)=0xf4240) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000400)={0x2, &(0x7f00000000c0)=[{0x5, 0xffffffffffffffc1, 0x5, 0x100000000}, {0x7, 0x4, 0x4, 0x7ff}]}, 0x10) getsockopt$inet6_dccp_buf(r0, 0x21, 0xf, &(0x7f00000001c0)=""/209, &(0x7f0000000100)=0xd1) getitimer(0x1, &(0x7f00000003c0)) write$P9_RRENAME(r0, &(0x7f0000000140)={0x7, 0x15, 0x1}, 0x7) [ 165.184417][T12648] IPVS: ftp: loaded support on port[0] = 21 [ 165.409156][T12648] chnl_net:caif_netlink_parms(): no params data found [ 165.438979][T12648] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.446821][T12648] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.455281][T12648] device bridge_slave_0 entered promiscuous mode [ 165.528533][T12648] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.535957][T12648] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.543791][T12648] device bridge_slave_1 entered promiscuous mode [ 165.628689][T12648] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 165.639993][T12648] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 165.657453][T12648] team0: Port device team_slave_0 added [ 165.664869][T12648] team0: Port device team_slave_1 added [ 165.782106][T12648] device hsr_slave_0 entered promiscuous mode [ 165.810448][T12648] device hsr_slave_1 entered promiscuous mode [ 165.919979][ T21] device hsr_slave_0 left promiscuous mode [ 165.989994][ T21] device hsr_slave_1 left promiscuous mode [ 166.070078][ T21] device bridge_slave_1 left promiscuous mode [ 166.076288][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.140452][ T21] device bridge_slave_0 left promiscuous mode [ 166.146619][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.995740][ T21] team0 (unregistering): Port device team_slave_1 removed [ 168.008045][ T21] team0 (unregistering): Port device team_slave_0 removed [ 168.020146][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 168.067925][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 168.156911][ T21] bond0 (unregistering): Released all slaves [ 168.288805][T12648] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.296170][T12648] bridge0: port 2(bridge_slave_1) entered forwarding state [ 168.303572][T12648] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.310725][T12648] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.320803][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.328479][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.375420][T12648] 8021q: adding VLAN 0 to HW filter on device bond0 [ 168.388557][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 168.396647][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 168.451278][T12648] 8021q: adding VLAN 0 to HW filter on device team0 [ 168.462008][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 168.473415][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 168.482256][ T9482] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.489308][ T9482] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.510586][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 168.519231][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 168.528257][ T9482] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.535378][ T9482] bridge0: port 2(bridge_slave_1) entered forwarding state [ 168.545071][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 168.554428][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 168.563595][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 168.573137][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 168.596751][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 168.604925][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 168.620618][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 168.629177][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 168.645079][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 168.657129][T12648] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 168.669334][T12648] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 168.678687][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 168.688163][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 168.714042][T12648] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 168.883874][T12656] netlink: 'syz-executor.2': attribute type 6 has an invalid length. 02:37:58 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) 02:37:58 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:58 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:58 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:58 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:58 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000100)={'filter\x00', 0x4, [{}, {}, {}, {}]}, 0x68) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/45, 0x2d) 02:37:58 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:58 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:58 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:58 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:58 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f00000001c0)={0x40000000, 0x109, "f47906f8c6cfee6da33cac5257478a7ddbde08678ba7f97170142488452ed043", 0x7, 0x5, 0x1, 0x4840f4c2, 0x100000000, 0xff35, 0xbb, 0x4, [0x6, 0x80, 0x20, 0x100000000]}) 02:37:59 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:59 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) 02:37:59 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:59 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:59 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:59 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x8001004, 0xdf}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202}, 0x0, 0x0, 0x0, 0x0) 02:37:59 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:59 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:59 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:59 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) clock_getres(0x0, &(0x7f00000000c0)) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x414, &(0x7f0000000040)={0x29, 0x0, 0x80000, 0xfffffffffffffffc, 0x0, 0x3, 0x20}, 0x0, 0x0, 0x0, 0x0) 02:37:59 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:37:59 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:59 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) time(&(0x7f00000000c0)) 02:37:59 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:59 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:37:59 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:59 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x4010, r0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x0, 0xffffffff80000001, 0x8, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0x0, 0x0) 02:38:00 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:00 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) [ 170.339451][ T24] audit: type=1400 audit(1563071880.112:51): avc: denied { map } for pid=12728 comm="syz-executor.0" path="/selinux/avc/cache_threshold" dev="selinuxfs" ino=25 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=file permissive=1 02:38:00 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:00 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:00 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(r0, 0x21, 0xc0, &(0x7f00000000c0)="bdb158a03696532f330baedfa9238ae7a04e66b25383cb93eadc1dafcd1b208fc276ba0242ecd3261e521e38926a8f0bfda6508b7ff0fe968b7b49a0494dded90952a0a808fa616a979f97ffa2ab9a24c2d54a5611d8f45d2897c61f23a8764c1255810ce2926ec744065dca96f921175ab3eba7c81937d7ca6220ce58661f92a3bee53e", 0x84) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f00000001c0)=@ccm_128={{0x307}, "74aef35489ab766c", "03cfc64b3e6e9afce38f3d3f279e4101", "2fc581a6", "9bafba8859df5c06"}, 0x28) 02:38:00 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:00 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) [ 171.335862][T12764] IPVS: ftp: loaded support on port[0] = 21 [ 171.411172][T12764] chnl_net:caif_netlink_parms(): no params data found [ 171.573605][T12764] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.581144][T12764] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.588954][T12764] device bridge_slave_0 entered promiscuous mode [ 171.663495][T12764] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.670825][T12764] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.678467][T12764] device bridge_slave_1 entered promiscuous mode [ 171.697872][T12764] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 171.708921][T12764] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 171.798940][T12764] team0: Port device team_slave_0 added [ 171.806589][T12764] team0: Port device team_slave_1 added [ 171.922062][T12764] device hsr_slave_0 entered promiscuous mode [ 171.960000][T12764] device hsr_slave_1 entered promiscuous mode [ 172.009913][T12764] debugfs: Directory 'hsr0' with parent '/' already present! [ 172.093442][T12764] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.100702][T12764] bridge0: port 2(bridge_slave_1) entered forwarding state [ 172.108002][T12764] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.115124][T12764] bridge0: port 1(bridge_slave_0) entered forwarding state [ 172.220172][T12764] 8021q: adding VLAN 0 to HW filter on device bond0 [ 172.297666][T12764] 8021q: adding VLAN 0 to HW filter on device team0 [ 172.304846][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 172.313628][ T9482] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.322015][ T9482] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.330845][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 172.411188][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 172.420163][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 172.429573][ T3687] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.436706][ T3687] bridge0: port 1(bridge_slave_0) entered forwarding state [ 172.446212][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 172.457897][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 172.466509][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.473571][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 172.560237][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 172.568763][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 172.577412][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 172.586355][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 172.595642][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 172.640060][ T21] device hsr_slave_0 left promiscuous mode [ 172.689834][ T21] device hsr_slave_1 left promiscuous mode [ 172.799966][ T21] device bridge_slave_1 left promiscuous mode [ 172.806218][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.870427][ T21] device bridge_slave_0 left promiscuous mode [ 172.876601][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.744884][ T21] team0 (unregistering): Port device team_slave_1 removed [ 174.759086][ T21] team0 (unregistering): Port device team_slave_0 removed [ 174.775202][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 174.836340][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 174.931175][ T21] bond0 (unregistering): Released all slaves [ 175.041640][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 175.051596][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 175.060244][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 175.068632][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 175.078097][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 175.086627][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 175.097114][T12764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 175.125800][T12764] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 175.251800][T12772] netlink: 'syz-executor.2': attribute type 6 has an invalid length. 02:38:05 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) time(&(0x7f00000000c0)) 02:38:05 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:05 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:05 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x5, 0x2080) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f00000001c0)={{0x6, 0x8}, 0x4a}, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') write$eventfd(r1, &(0x7f0000000300)=0x100000000, 0x8) sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x101020}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="93d17b00109361ec30000000aa5ecfd1acd7c84087c2aa502e33f20912070000009a2c33911373010000001d588d003034f572d3e116c389bb9388", @ANYRES16=r3, @ANYBLOB="000301000000fedbdf2501000000000000000741000000140018000000057564703a73797a3000000000"], 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x8000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r2, 0x54a2) 02:38:05 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:05 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:05 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:05 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:05 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:05 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:05 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000002c0), &(0x7f0000000300)=0x4) r2 = request_key(&(0x7f00000003c0)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='\x00', 0xfffffffffffffffe) keyctl$assume_authority(0x10, r2) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000340)={0x1f, 0x6b04a42f, 0xdc, 0xf3, 0xffffffffffffffff, 0x9}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000580)={r0, &(0x7f0000000480)="8f93cd2acc55398983ad00213b4a1ad52490056796636e2842799016389193851fe8a1d960de20616a72d0b47408296ac159177a5de779340612db4095f7c06fba2b9eaed42eb9466c110874da8c70385903dbe2ac70d7aca0baa5d3f61b5fc05415df391499599efcd3550a26a87c315cc19594f3fabe019108ed9bdefa6be1b86f24df565e7516378f96d59849a4e1630ea9f4a5b9522a6dbc8148e0ab6db67392d6b2def8c5b545c5c6aacd2d0f11d4fae7922c7cd0e3349c27bf5e43e9c9538cd0609c643d31233fbe1d94", &(0x7f00000000c0)="1b06d2d73b39847f44f3f0c56a46aa836ce2ed65a7cf89bc2cd5bb060983010efd86ae4012660d8f494510bbe7bed2db2c41221e740c48b4030126d979382db7bcab0231538e1d8e7c8dfecffd81a0aa8103971080fc8380caf3cd8077c9a6944ec49b782cf121ab00"/117, 0x1}, 0xfffffe82) 02:38:05 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:05 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) time(&(0x7f00000000c0)) 02:38:05 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:05 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:05 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:05 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:05 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000100)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x3, [@null, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) ioctl$KIOCSOUND(r0, 0x4b2f, 0x2) 02:38:05 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:06 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:06 executing program 0: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/policy\x00', 0x0, 0x0) fdatasync(r0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) sendmsg$nl_generic(r1, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x20, 0x1d, 0x0, 0x70bd2b, 0x25dfdbff, {0x7}, [@generic="9b6ade9d878801dc2c"]}, 0x20}, 0x1, 0x0, 0x0, 0x57103e402ae383b2}, 0x20000040) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000440)=[{&(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f00000003c0)=[{&(0x7f00000001c0)="77d9dc9954a06c04ce61ad338814cf1d3399cc8e920c08bc1e80ac01035e9d0df7aac0457e760fb9799eb2771df57b5c6735c2f22a801cedb9a3ec2714251cce5c6be5f675644aa77eba8f9dfe64557a17ae455d3a", 0x55}, {&(0x7f0000000240)="bce839b906e79ccc1c71fc6b88b69c067446ce0dda11733730229a0a53c226cdbfb32ebcd04c63e3ffd16ddfc59f942e7833eb30e3145b8d59d29a5a2d907798a415e8fcb8dba1ee", 0x48}, {&(0x7f00000002c0)="28c32ce6dbbd62158f727d61c2879a5b909e435d24d88a6e8696e65d00c27cfe21111d77ee75b7ff73c385697048b99f3969dc52b73feffa84326b150d6e41420d96d60fba462b056b90fb104547fae815f65d47fcb25d825c42844d7117e26a0d0309255dbb4af739c27f6ecee93e4251b55a72444007e62d777b05958779444ffa75f96e64ed0968c87b5e88cf9c7a57b07a98d88ca6736d7d26797c6b65bc70333ce7297c03e8fde3fce4eeaa88ad0815ea70925c82bcb676779c8332d45a478e8eba47d73876378803683c779d75947b09b220873e3a9c8e51da1acb7fe635837fb44778d114", 0xe8}, {&(0x7f0000000140)="394bb328b83e5b4350f9848cafa2853df0bf", 0x12}], 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="160000000000802001f8df0001000193", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r3, @ANYRES32=r1], 0x20, 0x20000040}], 0x1, 0x20000001) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000640)='/dev/ubi_ctrl\x00', 0x80000, 0x0) fsconfig$FSCONFIG_SET_PATH(r1, 0x3, &(0x7f0000000480)='/selinux/avc/cache_threshold\x00', &(0x7f00000004c0)='./file0\x00', 0xffffffffffffff9c) 02:38:06 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:06 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:06 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:06 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:38:06 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:06 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:06 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:06 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:06 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x82c00, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x6000, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f00000001c0)=0x100, 0x4) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(r1, &(0x7f00000000c0)={0x8}, 0x8) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000240)={0x80000000, 0x0, 0x10001}) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f0000000180)={0x6, r2, 0x0, 0x6}) pselect6(0x32, &(0x7f0000000140)={0xfffffffffffffffc, 0x0, 0x4, 0xfffffffffffffffd, 0x0, 0x0, 0x4000000, 0x4}, 0x0, 0x0, 0x0, 0x0) modify_ldt$write(0x1, &(0x7f0000000100)={0x1f, 0xffffffffffffffff, 0xffffffffffffffff, 0x7, 0xffff, 0x4, 0x1, 0x1, 0x0, 0x1}, 0x10) 02:38:06 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:06 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:06 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:06 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:06 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:06 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x80, 0x0) [ 177.666239][T12886] IPVS: ftp: loaded support on port[0] = 21 [ 177.786101][T12886] chnl_net:caif_netlink_parms(): no params data found [ 177.827645][T12886] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.836004][T12886] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.844025][T12886] device bridge_slave_0 entered promiscuous mode [ 177.852812][T12886] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.860491][T12886] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.868142][T12886] device bridge_slave_1 entered promiscuous mode [ 177.887257][T12886] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 177.897969][T12886] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 177.918302][T12886] team0: Port device team_slave_0 added [ 177.925897][T12886] team0: Port device team_slave_1 added [ 178.011696][T12886] device hsr_slave_0 entered promiscuous mode [ 178.070028][T12886] device hsr_slave_1 entered promiscuous mode [ 178.151808][T12886] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.159005][T12886] bridge0: port 2(bridge_slave_1) entered forwarding state [ 178.166404][T12886] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.173511][T12886] bridge0: port 1(bridge_slave_0) entered forwarding state [ 178.209009][T12886] 8021q: adding VLAN 0 to HW filter on device bond0 [ 178.225263][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 178.233551][ T9480] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.245333][ T9480] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.254143][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 178.266217][T12886] 8021q: adding VLAN 0 to HW filter on device team0 [ 178.280493][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 178.288981][ T9482] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.296118][ T9482] bridge0: port 1(bridge_slave_0) entered forwarding state [ 178.450942][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 178.459528][ T9480] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.466727][ T9480] bridge0: port 2(bridge_slave_1) entered forwarding state [ 178.475513][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 178.486350][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 178.571600][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 178.580561][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 178.588704][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 178.599281][T12886] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 178.687578][T12886] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 178.932403][T12895] netlink: 'syz-executor.2': attribute type 6 has an invalid length. 02:38:08 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:38:08 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(r0, &(0x7f0000000180)={0x1}, 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:38:08 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:08 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:08 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:08 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:08 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:08 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:08 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:08 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:08 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x3, 0x18}, 0xc) fremovexattr(r0, &(0x7f0000000100)=@known='system.sockprotoname\x00') r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x43, "d5cb5563847ab7c3ce329762555dd3748fe0f55520fe64ea5274772668e327934fcdc342f8c19f039f4c0135e24e8d07006bde71325bf864fd1398c7cbe361b6c73c7e"}, &(0x7f0000000140)=0x4b) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000240)={r2, 0xffff, 0x30, 0x7, 0x3}, &(0x7f0000000280)=0x18) 02:38:09 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:09 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:38:09 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:09 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:09 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:09 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) recvmmsg(r0, &(0x7f00000045c0)=[{{&(0x7f00000000c0)=@ax25={{0x3, @rose}, [@bcast, @rose, @null, @bcast, @remote, @bcast, @null, @netrom]}, 0x80, &(0x7f0000001800)=[{&(0x7f00000001c0)=""/187, 0xbb}, {&(0x7f0000000280)=""/173, 0xad}, {&(0x7f0000000340)=""/239, 0xef}, {&(0x7f0000000440)=""/142, 0x8e}, {&(0x7f0000000500)=""/94, 0x5e}, {&(0x7f0000000580)=""/201, 0xc9}, {&(0x7f0000000680)=""/195, 0xc3}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000140)=""/19, 0x13}, {&(0x7f0000001780)=""/112, 0x70}], 0xa, &(0x7f00000018c0)=""/18, 0x12}, 0x400}, {{&(0x7f0000001900)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000001980)=""/124, 0x7c}], 0x1, &(0x7f0000001a40)=""/154, 0x9a}, 0x7}, {{&(0x7f0000001b00)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001b80)=""/233, 0xe9}], 0x1, &(0x7f0000001cc0)=""/228, 0xe4}, 0x3a}, {{0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000001dc0)=""/133, 0x85}, {&(0x7f0000001e80)=""/184, 0xb8}, {&(0x7f0000001f40)=""/168, 0xa8}], 0x3}, 0x8}, {{&(0x7f0000002040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000002480)=[{&(0x7f00000020c0)=""/122, 0x7a}, {&(0x7f0000002140)=""/90, 0x5a}, {&(0x7f00000021c0)=""/182, 0xb6}, {&(0x7f0000002280)=""/16, 0x10}, {&(0x7f00000022c0)=""/126, 0x7e}, {&(0x7f0000002340)=""/237, 0xed}, {&(0x7f0000002440)=""/46, 0x2e}], 0x7, &(0x7f0000002500)=""/71, 0x47}, 0x8001}, {{0x0, 0x0, &(0x7f0000002980)=[{&(0x7f0000002580)=""/223, 0xdf}, {&(0x7f0000002680)=""/186, 0xba}, {&(0x7f0000002740)=""/52, 0x34}, {&(0x7f0000002780)=""/11, 0xb}, {&(0x7f00000027c0)=""/202, 0xca}, {&(0x7f00000028c0)=""/185, 0xb9}], 0x6, &(0x7f0000002a00)=""/220, 0xdc}, 0x4}, {{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000002b00)=""/58, 0x3a}, {&(0x7f0000002b40)=""/6, 0x6}], 0x2, &(0x7f0000002bc0)=""/4096, 0x1000}, 0x7f}, {{&(0x7f0000003bc0)=@pptp, 0x80, &(0x7f0000004040)=[{&(0x7f0000003c40)=""/95, 0x5f}, {&(0x7f0000003cc0)=""/136, 0x88}, {&(0x7f0000003d80)=""/97, 0x61}, {&(0x7f0000003e00)=""/143, 0x8f}, {&(0x7f0000003ec0)=""/27, 0x1b}, {&(0x7f0000003f00)=""/34, 0x22}, {&(0x7f0000003f40)=""/216, 0xd8}], 0x7, &(0x7f00000040c0)=""/74, 0x4a}, 0xea}, {{&(0x7f0000004140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000004480)=[{&(0x7f00000041c0)=""/254, 0xfe}, {&(0x7f00000042c0)=""/134, 0x86}, {&(0x7f0000004380)=""/43, 0x2b}, {&(0x7f00000043c0)=""/94, 0x5e}, {&(0x7f0000004440)=""/59, 0x3b}], 0x5, &(0x7f0000004500)=""/149, 0x95}, 0x127}], 0x9, 0x2000, &(0x7f0000004800)={0x0, 0x989680}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:38:09 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:09 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:09 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:09 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:09 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) bind$bt_sco(r0, &(0x7f00000000c0)={0x1f, {0x3ff, 0x80000001, 0x9, 0x1f2, 0x7, 0x7f}}, 0x8) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x8281, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29, 0x2}, 0x0, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) 02:38:09 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:09 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:38:09 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:09 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:10 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:10 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) dup2(r0, r1) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:38:10 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:10 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:10 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:10 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:10 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:10 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r0, 0x4010ae74, &(0x7f00000001c0)={0xfffffffffffffff9, 0x0, 0x7}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x10001, 0x0, 0x8000}, 0x4) setxattr$trusted_overlay_redirect(&(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000240)='./file0\x00', 0x8, 0x3) 02:38:10 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) [ 180.930366][ T21] device hsr_slave_0 left promiscuous mode [ 180.979990][ T21] device hsr_slave_1 left promiscuous mode [ 181.140179][ T21] device bridge_slave_1 left promiscuous mode [ 181.146371][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.200763][ T21] device bridge_slave_0 left promiscuous mode [ 181.206951][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.091956][ T21] team0 (unregistering): Port device team_slave_1 removed [ 183.105670][ T21] team0 (unregistering): Port device team_slave_0 removed [ 183.117119][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 183.158690][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 183.236641][ T21] bond0 (unregistering): Released all slaves [ 183.379970][T13004] IPVS: ftp: loaded support on port[0] = 21 [ 183.454360][T13004] chnl_net:caif_netlink_parms(): no params data found [ 183.487733][T13004] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.495106][T13004] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.502850][T13004] device bridge_slave_0 entered promiscuous mode [ 183.580255][T13004] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.587355][T13004] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.602869][T13004] device bridge_slave_1 entered promiscuous mode [ 183.639328][T13004] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 183.656848][T13004] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 183.681864][T13004] team0: Port device team_slave_0 added [ 183.689245][T13004] team0: Port device team_slave_1 added [ 183.752714][T13004] device hsr_slave_0 entered promiscuous mode [ 183.790328][T13004] device hsr_slave_1 entered promiscuous mode [ 183.829732][T13004] debugfs: Directory 'hsr0' with parent '/' already present! [ 183.858588][T13004] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.865715][T13004] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.873138][T13004] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.880238][T13004] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.975609][T13004] 8021q: adding VLAN 0 to HW filter on device bond0 [ 183.998975][ T9487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 184.010939][ T9487] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.018929][ T9487] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.041560][T13004] 8021q: adding VLAN 0 to HW filter on device team0 [ 184.055575][ T9487] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 184.065578][ T9487] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.072697][ T9487] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.094737][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 184.103828][ T9482] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.110938][ T9482] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.131809][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 184.141172][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 184.150273][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 184.164167][T13004] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 184.176308][T13004] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 184.189616][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 184.197548][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 184.219513][T13004] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 184.410842][T13012] netlink: 'syz-executor.2': attribute type 6 has an invalid length. 02:38:14 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:38:14 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:14 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:14 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:14 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0xffff, 0x301100) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000500)=ANY=[@ANYRES32=0x0, @ANYBLOB="43000000fc9e875f7302988fd5fbe68726e14dbdc9cc4ddee62dd70da51367adfc1e89102e6ce31cb7d0aaa5536ba102f618ddf36c50f93d7d28d1205e9ebc67102a2f02ac7780"], &(0x7f00000001c0)=0x2) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000200)={r1, 0x7fff}, &(0x7f0000000240)=0x8) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000100)=[@in={0x2, 0x4e21, @multicast2}, @in={0x2, 0x4e24, @local}, @in={0x2, 0x24000, @loopback}, @in6={0xa, 0x4e22, 0x667, @loopback, 0x5}], 0x4c) pselect6(0xfffffffffffffeae, &(0x7f0000000280)={0x5, 0xf4, 0x1, 0x3, 0x0, 0x100001, 0x9, 0xa}, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r2, 0x4038ae7a, &(0x7f00000004c0)={0x4dd0, 0x954, &(0x7f00000002c0)="a078e1df09b022905b9848e8fefef9dcd68ae207418e0be0d45d25fd62932127e17a6994955869bc61233b612bce536dde1f962e01b73cb0f08b3ccfcebd93271ac6dae69286caeabfe94d567f19fab7c1107f16ba3386c486e7a85ae1c2bd282fe807615ea8367a23cfbc4559d505151deff644513e51f2a76d3d4e6cffcca33c00bcfe49fb7e9bbef01e37c58dab16c8e9ec19e6921ca7612e53086bf90c7e5524595edd2338f3f47b04c72b0f8f3422f41b660ac86b60298b06ccd48e4f94c324d739ed9afd6674a7eee8c207c28de0dbb1b7233b9de4a79ce93011", &(0x7f00000003c0)="8fc6f3179842d4ff042da91d758c9c77b9c35e325365d63a21e340bdd59552d51ba38871efceb5573f4054dbdaa0239cca4f3ac67ff6e3d56fe948ad04858e8f4c3ae12825044a0afde857535ae9c3af17e735cf01a8490b36c771f6fcfca170c644c9e07b0aba85bfe83ea5c9027abb6e75923b5ed68268711f5c50ee0feef59e4836616377fd521264ced532ee68d190dde525eb6ed7a35e3f868ceffe2d70b720e50e2244aaa1ece4ea664d9d8c8a60a310e62d4ba8f61b5e2def3f96337326c4414e375b4db7eaaee6d169f5b8783f", 0xdd, 0xd1}) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000040)={0x97, 0x6}) 02:38:14 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:14 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:14 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:14 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:14 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:14 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f00000000c0)=""/3) 02:38:14 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:15 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:38:15 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:15 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:15 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:15 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SIOCGETLINKNAME(r0, 0x89e0, &(0x7f0000000240)={0x3, 0x1}) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$assume_authority(0x10, r2) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x100) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000140)=[{r3, 0x100}, {r3, 0x10}, {r0, 0x100}, {r3, 0x3}, {r1, 0x100}], 0x5, &(0x7f00000001c0), &(0x7f0000000200)={0x4}, 0x8) 02:38:15 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:15 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:15 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:15 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:15 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x20000, 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x4, &(0x7f0000000140)=[0xffffffffffffffff, 0x0, 0xee00, 0xee00]) getgroups(0x7, &(0x7f0000000240)=[0xee01, 0x0, 0xee01, 0x0, 0xee00, 0xee00, 0xffffffffffffffff]) setresgid(r1, r2, r3) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000280)=@sack_info={0x0, 0x8, 0x9}, &(0x7f00000002c0)=0xc) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000300)={r4, @in6={{0xa, 0x4e23, 0x400, @dev={0xfe, 0x80, [], 0x29}, 0x1}}}, 0x84) 02:38:15 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:15 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:38:15 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:15 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:15 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:15 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:38:15 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:15 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:15 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:15 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:15 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) 02:38:15 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:15 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) [ 186.748966][T13120] IPVS: ftp: loaded support on port[0] = 21 [ 186.818363][T13120] chnl_net:caif_netlink_parms(): no params data found [ 187.118152][T13120] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.125566][T13120] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.133706][T13120] device bridge_slave_0 entered promiscuous mode [ 187.277332][T13120] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.284509][T13120] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.292761][T13120] device bridge_slave_1 entered promiscuous mode [ 187.448770][T13120] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 187.460583][T13120] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 187.614202][T13120] team0: Port device team_slave_0 added [ 187.621375][T13120] team0: Port device team_slave_1 added [ 187.674386][T13120] device hsr_slave_0 entered promiscuous mode [ 187.730193][T13120] device hsr_slave_1 entered promiscuous mode [ 187.769846][T13120] debugfs: Directory 'hsr0' with parent '/' already present! [ 187.952413][T13120] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.105913][T13120] 8021q: adding VLAN 0 to HW filter on device team0 [ 188.113468][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 188.121394][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 188.134557][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 188.143377][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 188.152098][ T3687] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.159150][ T3687] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.167796][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.177770][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 188.187575][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.196538][ T9482] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.203641][ T9482] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.357882][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 188.368257][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 188.380987][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 188.389530][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 188.399393][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 188.407443][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 188.416607][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 188.569301][T13120] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 188.580578][T13120] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 188.593207][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 188.602105][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 188.611142][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 188.619373][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 188.629080][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 188.788397][T13120] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 188.830634][ T21] device hsr_slave_0 left promiscuous mode [ 188.879939][ T21] device hsr_slave_1 left promiscuous mode [ 188.990534][ T21] device bridge_slave_1 left promiscuous mode [ 188.996729][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.060851][ T21] device bridge_slave_0 left promiscuous mode [ 189.067080][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.179992][ T21] device hsr_slave_0 left promiscuous mode [ 189.239849][ T21] device hsr_slave_1 left promiscuous mode [ 189.330117][ T21] device bridge_slave_1 left promiscuous mode [ 189.336411][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.390843][ T21] device bridge_slave_0 left promiscuous mode [ 189.397026][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.112092][ T21] team0 (unregistering): Port device team_slave_1 removed [ 193.123878][ T21] team0 (unregistering): Port device team_slave_0 removed [ 193.135443][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 193.177380][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 193.267324][ T21] bond0 (unregistering): Released all slaves [ 193.395825][ T21] team0 (unregistering): Port device team_slave_1 removed [ 193.410998][ T21] team0 (unregistering): Port device team_slave_0 removed [ 193.424194][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 193.484521][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 193.577807][ T21] bond0 (unregistering): Released all slaves [ 193.789477][T13128] netlink: 'syz-executor.2': attribute type 6 has an invalid length. 02:38:23 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:38:23 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0xffffffffffffffa4) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x1190acbc0159fcc0, &(0x7f0000000040)={0x29, 0x0, 0x0, 0x0, 0x401, 0x0, 0x204}, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) 02:38:23 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:23 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:23 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:23 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:23 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:23 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:23 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:23 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f00000000c0)={0x3f, {{0x2, 0x4e24, @multicast2}}}, 0x88) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:38:23 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:23 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:24 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:38:24 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:24 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:24 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = signalfd(r0, &(0x7f0000000180), 0xfed0) fstat(r1, &(0x7f00000001c0)) syz_init_net_socket$netrom(0x6, 0x5, 0x0) io_uring_setup(0x4a, &(0x7f00000000c0)={0x0, 0x0, 0x1, 0x0, 0x36c}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:38:24 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:24 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:24 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:24 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:24 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:24 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:24 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:38:24 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f00000001c0)=""/231) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x10042, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f00000002c0)={{0x6, 0x6, 0x8, 0x6, 'syz1\x00', 0x2}, 0x0, [0x800000000, 0xec26, 0x9, 0xc7, 0x7f, 0x84, 0xffff, 0x1, 0x2, 0x5, 0x83db, 0x100000001, 0xc2, 0x7, 0x5, 0x7f, 0x8, 0x95b7, 0xfc, 0x7, 0x80000000, 0xff, 0xfffffffffffffff9, 0x0, 0x2, 0x4, 0x5, 0x9, 0x534, 0x401, 0x5, 0x1, 0x19c152fa, 0x5, 0x400, 0x3, 0x8, 0x2f3f536, 0x800, 0x9, 0x6, 0x7, 0xe18f, 0x2, 0x7fffffff, 0x6f8, 0xe541, 0xd1b5, 0xffffffffffffff80, 0x20, 0x9, 0x8, 0xd2, 0x0, 0xffffffffffffff80, 0x200, 0x0, 0x114, 0x200, 0x3f, 0x1f, 0x9, 0x81, 0x237, 0x7, 0x2, 0x8, 0xe0, 0x7f, 0x1e, 0x7, 0x9, 0x7b, 0x1, 0xfff, 0x4, 0x9, 0xf09, 0x7, 0x7, 0x0, 0x5, 0x0, 0x8, 0xfffffffffffffffd, 0x0, 0x800, 0x7, 0x6, 0x80000001, 0x7, 0x7fff, 0x4, 0x6, 0x9, 0xdb6f, 0x101, 0x1, 0x35ba, 0x62, 0x1000, 0x0, 0x7fffffff, 0x0, 0x3, 0x2, 0x9, 0x3, 0x81, 0x0, 0x9, 0x0, 0x5e8, 0x200, 0x81, 0x3, 0x6, 0x100000000, 0x0, 0xffffffff, 0x4, 0x7f, 0x888, 0xffff, 0x20, 0x2, 0x9d, 0x81], {r1, r2+30000000}}) pselect6(0x40, &(0x7f0000000040)={0x29}, 0x0, 0x0, 0x0, 0x0) 02:38:24 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:24 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:24 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:24 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:25 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:38:25 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:25 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:25 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:25 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:25 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) [ 195.553962][T13210] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 196.215666][T13231] IPVS: ftp: loaded support on port[0] = 21 [ 196.362284][T13231] chnl_net:caif_netlink_parms(): no params data found [ 196.393715][T13231] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.401007][T13231] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.409047][T13231] device bridge_slave_0 entered promiscuous mode [ 196.417486][T13231] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.424838][T13231] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.432958][T13231] device bridge_slave_1 entered promiscuous mode [ 196.454813][T13231] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 196.469209][T13231] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 196.495633][T13231] team0: Port device team_slave_0 added [ 196.503588][T13231] team0: Port device team_slave_1 added [ 196.562749][T13231] device hsr_slave_0 entered promiscuous mode [ 196.610045][T13231] device hsr_slave_1 entered promiscuous mode [ 196.692053][T13231] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.699230][T13231] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.706647][T13231] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.713746][T13231] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.764058][T13231] 8021q: adding VLAN 0 to HW filter on device bond0 [ 196.777005][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 196.786263][ T3687] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.795205][ T3687] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.808779][T13231] 8021q: adding VLAN 0 to HW filter on device team0 [ 196.819111][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 196.828721][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.835839][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.850723][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 196.859077][ T3687] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.866171][ T3687] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.880838][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 196.889570][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 196.912152][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 196.921231][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 196.929522][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 196.939449][T13231] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 196.965061][T13231] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 197.062596][T13239] netlink: 'syz-executor.2': attribute type 6 has an invalid length. 02:38:26 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:38:26 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:38:26 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:26 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:26 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:26 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:27 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:27 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:27 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:27 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:27 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:27 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:27 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:38:27 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:27 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:27 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:27 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 198.447840][T13285] IPVS: ftp: loaded support on port[0] = 21 [ 198.791624][T13285] chnl_net:caif_netlink_parms(): no params data found [ 198.821130][T13285] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.828292][T13285] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.836416][T13285] device bridge_slave_0 entered promiscuous mode [ 198.845765][T13285] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.852975][T13285] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.860815][T13285] device bridge_slave_1 entered promiscuous mode [ 199.015174][T13285] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 199.026379][T13285] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 199.183862][T13285] team0: Port device team_slave_0 added [ 199.191093][T13285] team0: Port device team_slave_1 added [ 199.251741][T13285] device hsr_slave_0 entered promiscuous mode [ 199.300212][T13285] device hsr_slave_1 entered promiscuous mode [ 199.340012][T13285] debugfs: Directory 'hsr0' with parent '/' already present! [ 199.549153][T13285] 8021q: adding VLAN 0 to HW filter on device bond0 [ 199.696816][T13285] 8021q: adding VLAN 0 to HW filter on device team0 [ 199.704843][ T9487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 199.713510][ T9487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 199.731883][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 199.743799][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 199.753873][ T9526] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.761018][ T9526] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.769447][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 199.778174][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 199.786593][ T9526] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.793703][ T9526] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.801436][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 199.810355][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 199.818935][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 199.827625][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 199.836384][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 199.844414][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 200.001914][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 200.011519][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 200.023865][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 200.032416][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 200.043830][T13285] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 200.055649][T13285] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 200.064222][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 200.073655][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 200.130025][ T21] device hsr_slave_0 left promiscuous mode [ 200.199959][ T21] device hsr_slave_1 left promiscuous mode [ 200.280217][ T21] device bridge_slave_1 left promiscuous mode [ 200.286428][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.340834][ T21] device bridge_slave_0 left promiscuous mode [ 200.347031][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.440021][ T21] device hsr_slave_0 left promiscuous mode [ 200.489879][ T21] device hsr_slave_1 left promiscuous mode [ 200.590088][ T21] device bridge_slave_1 left promiscuous mode [ 200.596282][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.650898][ T21] device bridge_slave_0 left promiscuous mode [ 200.657140][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.416195][ T21] team0 (unregistering): Port device team_slave_1 removed [ 204.430722][ T21] team0 (unregistering): Port device team_slave_0 removed [ 204.442605][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 204.486746][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 204.578312][ T21] bond0 (unregistering): Released all slaves [ 204.696559][ T21] team0 (unregistering): Port device team_slave_1 removed [ 204.708740][ T21] team0 (unregistering): Port device team_slave_0 removed [ 204.720540][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 204.774633][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 204.867369][ T21] bond0 (unregistering): Released all slaves [ 204.971138][T13285] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 205.088130][T13293] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 02:38:34 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:38:34 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:34 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:34 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:34 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:34 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:38:35 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:35 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:35 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:35 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:35 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:35 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:35 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:38:35 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:35 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:35 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:35 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) [ 206.468488][T13340] IPVS: ftp: loaded support on port[0] = 21 [ 206.583408][T13340] chnl_net:caif_netlink_parms(): no params data found [ 206.625278][T13340] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.633293][T13340] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.641998][T13340] device bridge_slave_0 entered promiscuous mode [ 206.650827][T13340] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.657957][T13340] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.666576][T13340] device bridge_slave_1 entered promiscuous mode [ 206.692117][T13340] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 206.703839][T13340] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 206.728186][T13340] team0: Port device team_slave_0 added [ 206.736815][T13340] team0: Port device team_slave_1 added [ 206.801620][T13340] device hsr_slave_0 entered promiscuous mode [ 206.850031][T13340] device hsr_slave_1 entered promiscuous mode [ 206.889928][T13340] debugfs: Directory 'hsr0' with parent '/' already present! [ 206.909939][T13340] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.917046][T13340] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.924471][T13340] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.931573][T13340] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.988471][T13340] 8021q: adding VLAN 0 to HW filter on device bond0 [ 207.008470][T13340] 8021q: adding VLAN 0 to HW filter on device team0 [ 207.017125][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 207.026135][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.034441][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.068720][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 207.078596][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 207.087527][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.094639][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 207.115781][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 207.124541][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 207.133396][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.140509][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 207.148095][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 207.156849][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 207.170016][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 207.178720][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 207.195816][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 207.216826][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 207.232955][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 207.246887][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 207.259359][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 207.275244][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 207.286052][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 207.306406][T13340] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 207.337813][T13340] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 207.497760][T13348] netlink: 'syz-executor.2': attribute type 6 has an invalid length. 02:38:37 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:38:37 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:37 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:37 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:37 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:37 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) 02:38:37 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:37 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:37 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:37 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:37 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:37 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:38 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:38:38 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:38 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:38 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:38 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) [ 208.741733][T13395] IPVS: ftp: loaded support on port[0] = 21 [ 208.812680][T13395] chnl_net:caif_netlink_parms(): no params data found [ 209.249071][T13395] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.256720][T13395] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.264545][T13395] device bridge_slave_0 entered promiscuous mode [ 209.275387][T13395] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.284318][T13395] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.292513][T13395] device bridge_slave_1 entered promiscuous mode [ 209.315374][T13395] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 209.326340][T13395] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 209.551441][T13395] team0: Port device team_slave_0 added [ 209.558562][T13395] team0: Port device team_slave_1 added [ 209.812029][T13395] device hsr_slave_0 entered promiscuous mode [ 209.830130][T13395] device hsr_slave_1 entered promiscuous mode [ 209.869896][T13395] debugfs: Directory 'hsr0' with parent '/' already present! [ 210.115572][T13395] 8021q: adding VLAN 0 to HW filter on device bond0 [ 210.333689][T13395] 8021q: adding VLAN 0 to HW filter on device team0 [ 210.341821][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 210.354712][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 210.362501][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 210.590542][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 210.599446][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 210.608402][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.615505][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 210.623876][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 210.634129][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 210.648040][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.655149][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.663419][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 210.672324][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 210.681498][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 210.902402][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 210.911435][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 210.920563][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 210.938035][T13395] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 210.948747][T13395] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 210.960571][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 210.969221][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 210.977758][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 210.986432][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 210.995031][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 211.003299][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 211.011751][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 211.227328][T13395] 8021q: adding VLAN 0 to HW filter on device batadv0 02:38:41 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) [ 211.537160][T13403] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 02:38:41 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:41 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:41 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:41 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:41 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:38:41 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:41 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) [ 211.632328][ T21] device hsr_slave_0 left promiscuous mode [ 211.661114][ T21] device hsr_slave_1 left promiscuous mode 02:38:41 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:41 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) [ 211.780192][ T21] device bridge_slave_1 left promiscuous mode [ 211.786455][ T21] bridge0: port 2(bridge_slave_1) entered disabled state 02:38:41 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:41 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) [ 211.882745][ T21] device bridge_slave_0 left promiscuous mode [ 211.888975][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.031827][ T21] device hsr_slave_0 left promiscuous mode [ 212.080070][ T21] device hsr_slave_1 left promiscuous mode [ 212.160139][ T21] device bridge_slave_1 left promiscuous mode [ 212.166355][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.230818][ T21] device bridge_slave_0 left promiscuous mode [ 212.237124][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.340297][ T21] device hsr_slave_0 left promiscuous mode [ 212.379925][ T21] device hsr_slave_1 left promiscuous mode [ 212.460133][ T21] device bridge_slave_1 left promiscuous mode [ 212.468541][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.520827][ T21] device bridge_slave_0 left promiscuous mode [ 212.527038][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.233950][ T21] team0 (unregistering): Port device team_slave_1 removed [ 218.247291][ T21] team0 (unregistering): Port device team_slave_0 removed [ 218.261722][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 218.335308][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 218.427643][ T21] bond0 (unregistering): Released all slaves [ 218.546097][ T21] team0 (unregistering): Port device team_slave_1 removed [ 218.558693][ T21] team0 (unregistering): Port device team_slave_0 removed [ 218.572829][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 218.635103][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 218.707935][ T21] bond0 (unregistering): Released all slaves [ 218.803602][ T21] team0 (unregistering): Port device team_slave_1 removed [ 218.815177][ T21] team0 (unregistering): Port device team_slave_0 removed [ 218.827592][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 218.865907][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 218.938411][ T21] bond0 (unregistering): Released all slaves 02:38:49 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) 02:38:49 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:49 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:49 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:49 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) [ 219.206413][T13436] IPVS: ftp: loaded support on port[0] = 21 [ 219.505102][T13436] chnl_net:caif_netlink_parms(): no params data found [ 219.537931][T13436] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.545982][T13436] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.554375][T13436] device bridge_slave_0 entered promiscuous mode [ 219.563031][T13436] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.570491][T13436] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.578321][T13436] device bridge_slave_1 entered promiscuous mode [ 219.599266][T13436] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 219.611177][T13436] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 219.629198][T13436] team0: Port device team_slave_0 added [ 219.637437][T13436] team0: Port device team_slave_1 added [ 219.713002][T13436] device hsr_slave_0 entered promiscuous mode [ 219.780159][T13436] device hsr_slave_1 entered promiscuous mode [ 220.026617][T13436] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.033873][T13436] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.041500][T13436] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.048591][T13436] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.131927][T13436] 8021q: adding VLAN 0 to HW filter on device bond0 [ 220.154684][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 220.168198][ T9480] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.178350][ T9480] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.206088][T13436] 8021q: adding VLAN 0 to HW filter on device team0 [ 220.225205][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 220.237833][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 220.253425][ T9480] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.260683][ T9480] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.284046][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 220.299404][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 220.308320][ T9526] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.315602][ T9526] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.331039][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 220.370497][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 220.390742][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 220.409303][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 220.418345][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 220.436485][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 220.447593][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 220.463086][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 220.477356][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 220.489440][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 220.506260][T13436] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 220.517286][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 220.549975][T13436] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 220.700930][T13458] netlink: 'syz-executor.2': attribute type 6 has an invalid length. 02:38:50 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:50 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:50 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:50 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:50 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:38:50 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) time(&(0x7f00000000c0)) 02:38:50 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:50 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:50 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:50 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:50 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:50 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:50 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:50 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:51 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:51 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:51 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) [ 222.114166][T13502] IPVS: ftp: loaded support on port[0] = 21 [ 222.231415][T13502] chnl_net:caif_netlink_parms(): no params data found [ 222.275629][T13502] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.283790][T13502] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.292634][T13502] device bridge_slave_0 entered promiscuous mode [ 222.302749][T13502] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.310464][T13502] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.318699][T13502] device bridge_slave_1 entered promiscuous mode [ 222.345206][T13502] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 222.357388][T13502] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 222.401547][T13502] team0: Port device team_slave_0 added [ 222.409218][T13502] team0: Port device team_slave_1 added [ 222.482509][T13502] device hsr_slave_0 entered promiscuous mode [ 222.540232][T13502] device hsr_slave_1 entered promiscuous mode [ 222.579952][T13502] debugfs: Directory 'hsr0' with parent '/' already present! [ 222.599395][T13502] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.606643][T13502] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.614061][T13502] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.621392][T13502] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.662814][T13502] 8021q: adding VLAN 0 to HW filter on device bond0 [ 222.671160][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.679592][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.699828][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 222.707570][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 222.729415][T13502] 8021q: adding VLAN 0 to HW filter on device team0 [ 222.741271][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.759524][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.768268][T12888] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.775389][T12888] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.793459][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.806457][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.815046][T12888] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.822145][T12888] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.848048][T13502] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 222.859345][T13502] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 222.872752][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 222.881427][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 222.890050][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 222.898523][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 222.907057][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 222.916297][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 222.924782][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 222.934288][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 222.942728][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 222.951300][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 222.959764][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 222.967572][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 222.990070][T13502] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 223.373099][T13510] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 02:38:53 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) time(&(0x7f00000000c0)) 02:38:53 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:38:53 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:53 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:53 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:53 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:53 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:53 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:53 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:53 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:53 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:53 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:54 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:54 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) time(&(0x7f00000000c0)) 02:38:54 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:38:54 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:38:54 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 224.731123][T13557] IPVS: ftp: loaded support on port[0] = 21 [ 225.080877][T13557] chnl_net:caif_netlink_parms(): no params data found [ 225.113460][T13557] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.120914][T13557] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.128558][T13557] device bridge_slave_0 entered promiscuous mode [ 225.273682][T13557] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.285442][T13557] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.293416][T13557] device bridge_slave_1 entered promiscuous mode [ 225.454085][T13557] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 225.473262][T13557] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 225.492158][T13557] team0: Port device team_slave_0 added [ 225.634698][T13557] team0: Port device team_slave_1 added [ 225.702829][T13557] device hsr_slave_0 entered promiscuous mode [ 225.740143][T13557] device hsr_slave_1 entered promiscuous mode [ 225.789883][T13557] debugfs: Directory 'hsr0' with parent '/' already present! [ 225.830201][ T21] device hsr_slave_0 left promiscuous mode [ 225.879996][ T21] device hsr_slave_1 left promiscuous mode [ 225.990108][ T21] device bridge_slave_1 left promiscuous mode [ 225.996397][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.050964][ T21] device bridge_slave_0 left promiscuous mode [ 226.057232][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.170079][ T21] device hsr_slave_0 left promiscuous mode [ 226.209907][ T21] device hsr_slave_1 left promiscuous mode [ 226.350136][ T21] device bridge_slave_1 left promiscuous mode [ 226.356329][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.410779][ T21] device bridge_slave_0 left promiscuous mode [ 226.417006][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.181108][ T21] team0 (unregistering): Port device team_slave_1 removed [ 230.194072][ T21] team0 (unregistering): Port device team_slave_0 removed [ 230.205803][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 230.247803][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 230.346241][ T21] bond0 (unregistering): Released all slaves [ 230.494381][ T21] team0 (unregistering): Port device team_slave_1 removed [ 230.505717][ T21] team0 (unregistering): Port device team_slave_0 removed [ 230.518510][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 230.567791][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 230.647034][ T21] bond0 (unregistering): Released all slaves [ 230.802301][T13557] 8021q: adding VLAN 0 to HW filter on device bond0 [ 230.815962][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 230.824056][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 230.835993][T13557] 8021q: adding VLAN 0 to HW filter on device team0 [ 230.849237][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 230.858462][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 230.867130][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.874228][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.891607][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 230.899596][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 230.908423][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 230.916797][ T9480] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.923989][ T9480] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.932729][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 230.951070][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 230.960303][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 230.968947][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 230.977574][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 230.986374][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 230.995063][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 231.003409][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 231.012628][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 231.024639][T13557] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 231.036513][T13557] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 231.045646][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 231.054711][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 231.075719][T13557] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 231.205882][T13565] netlink: 'syz-executor.2': attribute type 6 has an invalid length. 02:39:01 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:39:01 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:01 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:01 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:01 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:01 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:39:01 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:01 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:01 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:01 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:01 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:01 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:01 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:39:01 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:01 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:01 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:01 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) [ 232.600206][T13612] IPVS: ftp: loaded support on port[0] = 21 [ 232.714828][T13612] chnl_net:caif_netlink_parms(): no params data found [ 232.757382][T13612] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.765737][T13612] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.774104][T13612] device bridge_slave_0 entered promiscuous mode [ 232.783398][T13612] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.790733][T13612] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.798460][T13612] device bridge_slave_1 entered promiscuous mode [ 232.817029][T13612] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 232.828227][T13612] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 232.851096][T13612] team0: Port device team_slave_0 added [ 232.858566][T13612] team0: Port device team_slave_1 added [ 232.932845][T13612] device hsr_slave_0 entered promiscuous mode [ 232.960036][T13612] device hsr_slave_1 entered promiscuous mode [ 233.020899][T13612] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.028101][T13612] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.035521][T13612] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.042656][T13612] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.079169][T13612] 8021q: adding VLAN 0 to HW filter on device bond0 [ 233.095560][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 233.105858][T12888] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.115179][T12888] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.130899][T13612] 8021q: adding VLAN 0 to HW filter on device team0 [ 233.143248][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 233.153355][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 233.162603][T12888] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.169718][T12888] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.193981][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 233.203332][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 233.212579][ T9482] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.219730][ T9482] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.228408][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 233.238830][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 233.260310][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 233.269087][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 233.278789][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 233.287856][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 233.300058][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 233.308523][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 233.317828][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 233.326740][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 233.337033][T13612] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 233.346309][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 233.371651][T13612] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 233.535922][T13620] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 02:39:03 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:39:03 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:03 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:03 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:03 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:03 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:39:03 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:03 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:03 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:03 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:03 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:03 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:04 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:39:04 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:04 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:04 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:04 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) [ 235.259400][T13667] IPVS: ftp: loaded support on port[0] = 21 [ 235.547991][T13667] chnl_net:caif_netlink_parms(): no params data found [ 235.786906][T13667] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.794414][T13667] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.803096][T13667] device bridge_slave_0 entered promiscuous mode [ 236.015730][T13667] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.022960][T13667] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.030944][T13667] device bridge_slave_1 entered promiscuous mode [ 236.051187][T13667] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 236.063238][T13667] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 236.281307][T13667] team0: Port device team_slave_0 added [ 236.288800][T13667] team0: Port device team_slave_1 added [ 236.331694][T13667] device hsr_slave_0 entered promiscuous mode [ 236.370039][T13667] device hsr_slave_1 entered promiscuous mode [ 236.419827][T13667] debugfs: Directory 'hsr0' with parent '/' already present! [ 236.671023][T13667] 8021q: adding VLAN 0 to HW filter on device bond0 [ 236.894852][T13667] 8021q: adding VLAN 0 to HW filter on device team0 [ 236.904122][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 236.912892][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 236.924625][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 236.933988][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 236.942428][T12888] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.949561][T12888] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.163740][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 237.176073][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 237.184762][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.194083][ T9482] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.201190][ T9482] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.221344][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 237.230807][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 237.239355][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 237.248702][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 237.257308][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 237.266076][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 237.274915][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 237.290895][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 237.302673][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 237.311000][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 237.319365][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 237.534715][T13667] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 237.560588][T13667] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 237.620369][ T21] device hsr_slave_0 left promiscuous mode [ 237.680180][ T21] device hsr_slave_1 left promiscuous mode [ 237.760187][ T21] device bridge_slave_1 left promiscuous mode [ 237.766446][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.810849][ T21] device bridge_slave_0 left promiscuous mode [ 237.817188][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.899965][ T21] device hsr_slave_0 left promiscuous mode [ 237.939951][ T21] device hsr_slave_1 left promiscuous mode [ 238.020979][ T21] device bridge_slave_1 left promiscuous mode [ 238.027177][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.090408][ T21] device bridge_slave_0 left promiscuous mode [ 238.096618][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.209907][ T21] device hsr_slave_0 left promiscuous mode [ 238.259854][ T21] device hsr_slave_1 left promiscuous mode [ 238.329995][ T21] device bridge_slave_1 left promiscuous mode [ 238.336328][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.400775][ T21] device bridge_slave_0 left promiscuous mode [ 238.407003][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.920155][ T21] team0 (unregistering): Port device team_slave_1 removed [ 243.933117][ T21] team0 (unregistering): Port device team_slave_0 removed [ 243.944456][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 243.985509][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 244.057820][ T21] bond0 (unregistering): Released all slaves [ 244.205894][ T21] team0 (unregistering): Port device team_slave_1 removed [ 244.217717][ T21] team0 (unregistering): Port device team_slave_0 removed [ 244.231181][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 244.278227][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 244.376809][ T21] bond0 (unregistering): Released all slaves [ 244.485180][ T21] team0 (unregistering): Port device team_slave_1 removed [ 244.497050][ T21] team0 (unregistering): Port device team_slave_0 removed [ 244.510105][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 244.537783][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 244.615354][ T21] bond0 (unregistering): Released all slaves [ 244.814551][T13675] netlink: 'syz-executor.2': attribute type 6 has an invalid length. 02:39:14 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:39:14 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:39:14 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:14 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:14 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:14 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:14 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:14 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:14 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:14 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:14 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:15 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:15 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:39:15 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:15 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:15 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:15 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) [ 246.176298][T13720] IPVS: ftp: loaded support on port[0] = 21 [ 246.322800][T13720] chnl_net:caif_netlink_parms(): no params data found [ 246.384443][T13720] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.397634][T13720] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.407123][T13720] device bridge_slave_0 entered promiscuous mode [ 246.422186][T13720] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.429337][T13720] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.440713][T13720] device bridge_slave_1 entered promiscuous mode [ 246.464365][T13720] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 246.475877][T13720] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 246.501723][T13720] team0: Port device team_slave_0 added [ 246.509185][T13720] team0: Port device team_slave_1 added [ 246.583311][T13720] device hsr_slave_0 entered promiscuous mode [ 246.630024][T13720] device hsr_slave_1 entered promiscuous mode [ 246.678908][T13720] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.686019][T13720] bridge0: port 2(bridge_slave_1) entered forwarding state [ 246.693400][T13720] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.700488][T13720] bridge0: port 1(bridge_slave_0) entered forwarding state [ 246.739468][T13720] 8021q: adding VLAN 0 to HW filter on device bond0 [ 246.757591][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 246.767910][ T9482] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.776239][ T9482] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.791184][T13720] 8021q: adding VLAN 0 to HW filter on device team0 [ 246.804221][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 246.813848][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 246.823157][ T9482] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.830277][ T9482] bridge0: port 1(bridge_slave_0) entered forwarding state [ 246.852613][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 246.862668][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 246.874400][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.881523][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 246.898458][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 246.907475][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 246.924729][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 246.937465][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 246.959091][T13720] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 246.976472][T13720] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 247.001639][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 247.011003][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 247.026055][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 247.036339][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 247.051881][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 247.064961][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 247.075809][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 247.113794][T13720] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 247.127563][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 247.244101][T13727] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 02:39:17 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:39:17 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:17 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:17 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:17 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:17 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:39:17 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:17 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:17 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:17 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:17 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:17 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:17 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:39:17 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:17 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:17 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:17 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) [ 248.558038][T13774] IPVS: ftp: loaded support on port[0] = 21 [ 248.626550][T13774] chnl_net:caif_netlink_parms(): no params data found [ 248.657788][T13774] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.665074][T13774] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.673229][T13774] device bridge_slave_0 entered promiscuous mode [ 248.944279][T13774] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.951687][T13774] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.959371][T13774] device bridge_slave_1 entered promiscuous mode [ 249.113552][T13774] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 249.129443][T13774] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 249.281576][T13774] team0: Port device team_slave_0 added [ 249.288374][T13774] team0: Port device team_slave_1 added [ 249.332940][T13774] device hsr_slave_0 entered promiscuous mode [ 249.370175][T13774] device hsr_slave_1 entered promiscuous mode [ 249.419845][T13774] debugfs: Directory 'hsr0' with parent '/' already present! [ 249.595319][T13774] 8021q: adding VLAN 0 to HW filter on device bond0 [ 249.742520][T13774] 8021q: adding VLAN 0 to HW filter on device team0 [ 249.752020][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 249.760030][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 249.781442][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 249.790970][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 249.799361][T12888] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.806595][T12888] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.814607][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 249.823757][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 249.832357][T12888] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.839406][T12888] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.847128][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 249.855775][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 249.864811][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 249.873518][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 250.020920][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 250.028778][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 250.037756][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 250.046563][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 250.057295][T13774] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 250.216368][T13774] 8021q: adding VLAN 0 to HW filter on device batadv0 02:39:20 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:39:20 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:20 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:20 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:20 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:20 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:39:20 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:20 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:20 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:20 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:20 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:20 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) [ 251.270416][ T21] device hsr_slave_0 left promiscuous mode [ 251.309918][ T21] device hsr_slave_1 left promiscuous mode [ 251.439978][ T21] device bridge_slave_1 left promiscuous mode [ 251.446175][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.510898][ T21] device bridge_slave_0 left promiscuous mode [ 251.517176][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.630076][ T21] device hsr_slave_0 left promiscuous mode [ 251.669881][ T21] device hsr_slave_1 left promiscuous mode [ 251.797594][ T21] device bridge_slave_1 left promiscuous mode [ 251.804379][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.850859][ T21] device bridge_slave_0 left promiscuous mode [ 251.857139][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.463032][ T21] team0 (unregistering): Port device team_slave_1 removed [ 255.474252][ T21] team0 (unregistering): Port device team_slave_0 removed [ 255.487158][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 255.533699][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 255.626583][ T21] bond0 (unregistering): Released all slaves [ 255.724526][ T21] team0 (unregistering): Port device team_slave_1 removed [ 255.736094][ T21] team0 (unregistering): Port device team_slave_0 removed [ 255.747470][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 255.806854][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 255.897879][ T21] bond0 (unregistering): Released all slaves 02:39:25 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:39:25 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:25 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:25 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:25 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) [ 256.037513][T13814] IPVS: ftp: loaded support on port[0] = 21 [ 256.336829][T13814] chnl_net:caif_netlink_parms(): no params data found [ 256.379206][T13814] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.388021][T13814] bridge0: port 1(bridge_slave_0) entered disabled state [ 256.396381][T13814] device bridge_slave_0 entered promiscuous mode [ 256.405866][T13814] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.413597][T13814] bridge0: port 2(bridge_slave_1) entered disabled state [ 256.422142][T13814] device bridge_slave_1 entered promiscuous mode [ 256.445529][T13814] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 256.457467][T13814] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 256.485182][T13814] team0: Port device team_slave_0 added [ 256.494168][T13814] team0: Port device team_slave_1 added [ 256.562695][T13814] device hsr_slave_0 entered promiscuous mode [ 256.610042][T13814] device hsr_slave_1 entered promiscuous mode [ 256.678466][T13814] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.685606][T13814] bridge0: port 2(bridge_slave_1) entered forwarding state [ 256.693011][T13814] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.700381][T13814] bridge0: port 1(bridge_slave_0) entered forwarding state [ 256.776252][T13814] 8021q: adding VLAN 0 to HW filter on device bond0 [ 256.798814][T13661] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 256.808703][T13661] bridge0: port 1(bridge_slave_0) entered disabled state [ 256.822835][T13661] bridge0: port 2(bridge_slave_1) entered disabled state [ 256.842190][T13814] 8021q: adding VLAN 0 to HW filter on device team0 [ 256.861416][T13661] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 256.876690][T13661] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.883789][T13661] bridge0: port 1(bridge_slave_0) entered forwarding state [ 256.910420][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 256.918905][ T9482] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.926032][ T9482] bridge0: port 2(bridge_slave_1) entered forwarding state [ 256.947810][T13814] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 256.958685][T13814] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 256.973124][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 256.982482][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 256.992628][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 257.012497][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 257.039075][T13814] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 257.049156][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 257.057112][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 02:39:27 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:27 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:27 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:27 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) [ 257.221727][T13836] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 02:39:27 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:39:27 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:39:27 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:27 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:27 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:27 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:27 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:27 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:27 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:27 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:27 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:27 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:27 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) [ 258.616067][T13880] IPVS: ftp: loaded support on port[0] = 21 [ 258.681690][T13880] chnl_net:caif_netlink_parms(): no params data found [ 258.715710][T13880] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.722987][T13880] bridge0: port 1(bridge_slave_0) entered disabled state [ 258.731972][T13880] device bridge_slave_0 entered promiscuous mode [ 258.739919][T13880] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.747059][T13880] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.756089][T13880] device bridge_slave_1 entered promiscuous mode [ 258.776601][T13880] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 259.046798][T13880] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 259.067316][T13880] team0: Port device team_slave_0 added [ 259.074962][T13880] team0: Port device team_slave_1 added [ 259.272869][T13880] device hsr_slave_0 entered promiscuous mode [ 259.310409][T13880] device hsr_slave_1 entered promiscuous mode [ 259.379917][T13880] debugfs: Directory 'hsr0' with parent '/' already present! [ 259.557624][T13880] 8021q: adding VLAN 0 to HW filter on device bond0 [ 259.699087][T13880] 8021q: adding VLAN 0 to HW filter on device team0 [ 259.707712][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 259.716023][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 259.725541][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 259.735196][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 259.743934][ T9482] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.751126][ T9482] bridge0: port 1(bridge_slave_0) entered forwarding state [ 259.901869][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 259.910190][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 259.918764][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 259.927319][ T9482] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.934404][ T9482] bridge0: port 2(bridge_slave_1) entered forwarding state [ 259.943396][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 259.952255][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 259.961520][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 259.970279][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 259.978973][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 260.128276][T13880] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 260.139201][T13880] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 260.152615][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 260.161793][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 260.171648][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 260.180180][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 260.188462][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 260.197890][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 260.350393][T13880] 8021q: adding VLAN 0 to HW filter on device batadv0 02:39:30 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:39:30 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) [ 260.712036][T13888] netlink: 'syz-executor.2': attribute type 6 has an invalid length. 02:39:30 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:30 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:30 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:30 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:39:30 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 260.850663][ T21] device hsr_slave_0 left promiscuous mode [ 260.890852][ T21] device hsr_slave_1 left promiscuous mode 02:39:30 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:30 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:30 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:30 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) [ 260.980995][ T21] device bridge_slave_1 left promiscuous mode [ 260.987364][ T21] bridge0: port 2(bridge_slave_1) entered disabled state 02:39:30 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) [ 261.101047][ T21] device bridge_slave_0 left promiscuous mode [ 261.114271][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.245252][ T21] device hsr_slave_0 left promiscuous mode [ 261.301372][ T21] device hsr_slave_1 left promiscuous mode [ 261.380066][ T21] device bridge_slave_1 left promiscuous mode [ 261.386279][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.430543][ T21] device bridge_slave_0 left promiscuous mode [ 261.436740][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.210451][ T21] team0 (unregistering): Port device team_slave_1 removed [ 265.222900][ T21] team0 (unregistering): Port device team_slave_0 removed [ 265.235669][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 265.284757][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 265.376335][ T21] bond0 (unregistering): Released all slaves [ 265.523568][ T21] team0 (unregistering): Port device team_slave_1 removed [ 265.534790][ T21] team0 (unregistering): Port device team_slave_0 removed [ 265.547184][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 265.594749][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 265.686038][ T21] bond0 (unregistering): Released all slaves 02:39:35 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:39:35 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:35 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:35 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:35 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) [ 265.806911][T13898] netlink: 'syz-executor.2': attribute type 6 has an invalid length. [ 265.828732][T13925] IPVS: ftp: loaded support on port[0] = 21 [ 266.087901][T13939] netlink: 'syz-executor.2': attribute type 6 has an invalid length. [ 266.197498][T13925] chnl_net:caif_netlink_parms(): no params data found [ 266.277483][T13925] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.289795][T13925] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.297892][T13925] device bridge_slave_0 entered promiscuous mode [ 266.313137][T13925] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.326106][T13925] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.335717][T13925] device bridge_slave_1 entered promiscuous mode [ 266.367442][T13925] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 266.386059][T13925] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 266.417154][T13925] team0: Port device team_slave_0 added [ 266.432385][T13925] team0: Port device team_slave_1 added [ 266.512881][T13925] device hsr_slave_0 entered promiscuous mode [ 266.590213][T13925] device hsr_slave_1 entered promiscuous mode [ 266.647586][T13925] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.654739][T13925] bridge0: port 2(bridge_slave_1) entered forwarding state [ 266.662316][T13925] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.669389][T13925] bridge0: port 1(bridge_slave_0) entered forwarding state [ 266.749608][T13925] 8021q: adding VLAN 0 to HW filter on device bond0 [ 266.772284][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 266.787629][ T3687] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.795568][ T3687] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.817515][T13925] 8021q: adding VLAN 0 to HW filter on device team0 [ 266.837325][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 266.854242][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 266.866988][ T9526] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.874133][ T9526] bridge0: port 1(bridge_slave_0) entered forwarding state [ 266.906540][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 266.915521][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 266.931709][ T9526] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.938778][ T9526] bridge0: port 2(bridge_slave_1) entered forwarding state [ 266.952705][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 266.964767][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 266.984666][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 266.993593][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 267.004005][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 267.013344][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 267.022372][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 267.031577][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 267.044686][T13925] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 267.056484][T13925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 267.067948][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 267.076679][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 267.085576][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 267.104238][T13925] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 267.242571][T13951] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 02:39:37 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:39:37 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:37 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:37 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:37 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:37 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:39:37 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:37 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:37 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:37 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:37 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:37 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:37 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:39:37 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:37 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:37 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:37 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:37 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) [ 268.118527][T13959] netlink: 'syz-executor.2': attribute type 6 has an invalid length. 02:39:38 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:38 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:38 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:38 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:38 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:39:38 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:38 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:38 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:38 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:38 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:39:38 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:38 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:38 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:38 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:38 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:39:38 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) [ 269.754969][T14038] IPVS: ftp: loaded support on port[0] = 21 [ 269.888041][T14038] chnl_net:caif_netlink_parms(): no params data found [ 269.987048][T14038] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.994586][T14038] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.002454][T14038] device bridge_slave_0 entered promiscuous mode [ 270.010964][T14038] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.018104][T14038] bridge0: port 2(bridge_slave_1) entered disabled state [ 270.026095][T14038] device bridge_slave_1 entered promiscuous mode [ 270.113794][T14038] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 270.124710][T14038] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 270.263006][T14038] team0: Port device team_slave_0 added [ 270.277935][T14038] team0: Port device team_slave_1 added [ 270.278338][T14041] IPVS: ftp: loaded support on port[0] = 21 [ 270.352997][T14038] device hsr_slave_0 entered promiscuous mode [ 270.420027][T14038] device hsr_slave_1 entered promiscuous mode [ 270.499787][T14038] debugfs: Directory 'hsr0' with parent '/' already present! [ 270.650509][ T268] device hsr_slave_0 left promiscuous mode [ 270.709953][ T268] device hsr_slave_1 left promiscuous mode [ 270.809993][ T268] device bridge_slave_1 left promiscuous mode [ 270.816251][ T268] bridge0: port 2(bridge_slave_1) entered disabled state [ 270.870582][ T268] device bridge_slave_0 left promiscuous mode [ 270.876759][ T268] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.708855][ T268] team0 (unregistering): Port device team_slave_1 removed [ 272.722356][ T268] team0 (unregistering): Port device team_slave_0 removed [ 272.733853][ T268] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 272.767718][ T268] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 272.847686][ T268] bond0 (unregistering): Released all slaves [ 273.000728][T14041] chnl_net:caif_netlink_parms(): no params data found [ 273.037380][T14041] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.045122][T14041] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.053671][T14041] device bridge_slave_0 entered promiscuous mode [ 273.062255][T14041] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.069312][T14041] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.077599][T14041] device bridge_slave_1 entered promiscuous mode [ 273.181976][T14038] 8021q: adding VLAN 0 to HW filter on device bond0 [ 273.191410][T14041] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 273.217819][T14038] 8021q: adding VLAN 0 to HW filter on device team0 [ 273.237600][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 273.254125][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 273.268949][T14041] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 273.291915][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 273.303586][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 273.312544][ T9526] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.319609][ T9526] bridge0: port 1(bridge_slave_0) entered forwarding state [ 273.328134][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 273.337093][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 273.353266][ T9526] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.360385][ T9526] bridge0: port 2(bridge_slave_1) entered forwarding state [ 273.375759][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 273.415186][T14038] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 273.425729][T14038] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 273.443787][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 273.460696][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 273.469487][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 273.479476][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 273.488426][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 273.498453][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 273.507404][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 273.516253][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 273.525203][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 273.534025][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 273.544168][T14041] team0: Port device team_slave_0 added [ 273.556569][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 273.564632][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 273.575489][T14041] team0: Port device team_slave_1 added [ 273.618369][T14038] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 273.692744][T14041] device hsr_slave_0 entered promiscuous mode [ 273.741018][T14041] device hsr_slave_1 entered promiscuous mode [ 273.800271][T14041] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.807377][T14041] bridge0: port 2(bridge_slave_1) entered forwarding state [ 273.814790][T14041] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.821974][T14041] bridge0: port 1(bridge_slave_0) entered forwarding state [ 273.944678][T14041] 8021q: adding VLAN 0 to HW filter on device bond0 [ 273.985833][ T9480] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.994281][ T9480] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.003377][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 274.026633][T14041] 8021q: adding VLAN 0 to HW filter on device team0 [ 274.037168][T14049] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 02:39:43 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:39:43 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:43 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:43 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:43 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) [ 274.104045][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 274.123809][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 02:39:44 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) [ 274.182991][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 274.199334][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 02:39:44 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:44 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:44 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 274.238734][ T9482] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.245967][ T9482] bridge0: port 1(bridge_slave_0) entered forwarding state 02:39:44 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) [ 274.351262][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 274.380251][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 274.448351][ T9482] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.455519][ T9482] bridge0: port 2(bridge_slave_1) entered forwarding state [ 274.493931][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 274.540827][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 274.549585][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 274.565216][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 274.590789][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 274.599378][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 274.796660][T14041] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 274.808360][T14041] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 274.820213][ T9487] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 274.828257][ T9487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 274.837176][ T9487] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 274.845728][ T9487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 274.854632][ T9487] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 274.863139][ T9487] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 274.892277][T14041] 8021q: adding VLAN 0 to HW filter on device batadv0 02:39:44 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:39:44 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:44 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:44 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:44 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:44 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) [ 275.061507][T14085] netlink: 'syz-executor.2': attribute type 6 has an invalid length. 02:39:45 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:45 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:45 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:45 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:45 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:45 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:45 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:39:45 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:45 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:45 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:45 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 276.417094][T14129] IPVS: ftp: loaded support on port[0] = 21 [ 276.499266][T14129] chnl_net:caif_netlink_parms(): no params data found [ 276.530042][T14129] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.537215][T14129] bridge0: port 1(bridge_slave_0) entered disabled state [ 276.545372][T14129] device bridge_slave_0 entered promiscuous mode [ 276.553461][T14129] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.560825][T14129] bridge0: port 2(bridge_slave_1) entered disabled state [ 276.568477][T14129] device bridge_slave_1 entered promiscuous mode [ 276.588653][T14129] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 276.997026][T14129] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 277.023319][T14129] team0: Port device team_slave_0 added [ 277.033119][T14129] team0: Port device team_slave_1 added [ 277.302820][T14129] device hsr_slave_0 entered promiscuous mode [ 277.360019][T14129] device hsr_slave_1 entered promiscuous mode [ 277.409796][T14129] debugfs: Directory 'hsr0' with parent '/' already present! [ 277.659284][T14129] 8021q: adding VLAN 0 to HW filter on device bond0 [ 277.872974][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 277.881422][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 277.892664][T14129] 8021q: adding VLAN 0 to HW filter on device team0 [ 277.903529][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 277.912843][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 277.922038][ T3687] bridge0: port 1(bridge_slave_0) entered blocking state [ 277.929088][ T3687] bridge0: port 1(bridge_slave_0) entered forwarding state [ 278.139222][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 278.147682][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 278.156558][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 278.165022][ T3687] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.172115][ T3687] bridge0: port 2(bridge_slave_1) entered forwarding state [ 278.389805][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 278.398598][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 278.412740][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 278.421613][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 278.431968][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 278.660105][T14129] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 278.671941][T14129] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 278.685109][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 278.693813][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 278.702886][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 278.712255][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 278.721493][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 278.730003][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 278.738583][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 278.967247][T14129] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 279.273070][ T268] device hsr_slave_0 left promiscuous mode [ 279.310054][ T268] device hsr_slave_1 left promiscuous mode [ 279.410031][ T268] device bridge_slave_1 left promiscuous mode [ 279.416285][ T268] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.470954][ T268] device bridge_slave_0 left promiscuous mode [ 279.477147][ T268] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.570481][ T268] device hsr_slave_0 left promiscuous mode [ 279.630085][ T268] device hsr_slave_1 left promiscuous mode [ 279.712154][ T268] device bridge_slave_1 left promiscuous mode [ 279.718392][ T268] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.780658][ T268] device bridge_slave_0 left promiscuous mode [ 279.786882][ T268] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.889985][ T268] device hsr_slave_0 left promiscuous mode [ 279.959948][ T268] device hsr_slave_1 left promiscuous mode [ 280.039985][ T268] device bridge_slave_1 left promiscuous mode [ 280.046187][ T268] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.081862][ T268] device bridge_slave_0 left promiscuous mode [ 280.088126][ T268] bridge0: port 1(bridge_slave_0) entered disabled state [ 285.681278][ T268] team0 (unregistering): Port device team_slave_1 removed [ 285.693767][ T268] team0 (unregistering): Port device team_slave_0 removed [ 285.706615][ T268] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 285.754258][ T268] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 285.827589][ T268] bond0 (unregistering): Released all slaves [ 285.930484][ T268] team0 (unregistering): Port device team_slave_1 removed [ 285.943677][ T268] team0 (unregistering): Port device team_slave_0 removed [ 285.956432][ T268] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 285.995780][ T268] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 286.087312][ T268] bond0 (unregistering): Released all slaves [ 286.215828][ T268] team0 (unregistering): Port device team_slave_1 removed [ 286.227537][ T268] team0 (unregistering): Port device team_slave_0 removed [ 286.239905][ T268] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 286.275352][ T268] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 286.367761][ T268] bond0 (unregistering): Released all slaves 02:39:56 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:39:56 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:56 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:56 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:56 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) [ 286.464017][T14137] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 02:39:56 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:56 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:56 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:56 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:56 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:56 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:56 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:56 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:39:56 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:56 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:56 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) [ 287.784912][T14181] IPVS: ftp: loaded support on port[0] = 21 [ 287.919478][T14181] chnl_net:caif_netlink_parms(): no params data found [ 287.982655][T14181] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.996329][T14181] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.004597][T14181] device bridge_slave_0 entered promiscuous mode [ 288.019422][T14181] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.026798][T14181] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.041859][T14181] device bridge_slave_1 entered promiscuous mode [ 288.064419][T14181] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 288.076229][T14181] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 288.099470][T14181] team0: Port device team_slave_0 added [ 288.109089][T14181] team0: Port device team_slave_1 added [ 288.185097][T14181] device hsr_slave_0 entered promiscuous mode [ 288.240143][T14181] device hsr_slave_1 entered promiscuous mode [ 288.326741][T14181] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.333881][T14181] bridge0: port 2(bridge_slave_1) entered forwarding state [ 288.341336][T14181] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.348407][T14181] bridge0: port 1(bridge_slave_0) entered forwarding state [ 288.398042][T14181] 8021q: adding VLAN 0 to HW filter on device bond0 [ 288.415646][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 288.424869][ T9526] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.433759][ T9526] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.455643][T14181] 8021q: adding VLAN 0 to HW filter on device team0 [ 288.471440][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 288.480667][ T9526] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.487739][ T9526] bridge0: port 1(bridge_slave_0) entered forwarding state [ 288.505982][ T9480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 288.514857][ T9480] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.521977][ T9480] bridge0: port 2(bridge_slave_1) entered forwarding state [ 288.542638][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 288.552509][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 288.569316][T14181] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 288.581022][T14181] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 288.594314][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 288.604264][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 288.613285][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 288.631790][ T3687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 288.644541][T14181] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 288.741753][T14189] netlink: 'syz-executor.2': attribute type 6 has an invalid length. 02:39:58 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:39:58 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:58 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:58 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:58 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:39:58 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:58 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:58 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:58 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:58 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) [ 289.009499][T14199] netlink: 'syz-executor.2': attribute type 6 has an invalid length. 02:39:58 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:39:58 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r0, 0x11, 0x2000000065, &(0x7f0000000300), &(0x7f0000000080)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000280)=0x245) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000140)={0x2, 0x6, 0x1, 0x1, 'syz0\x00', 0x6}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCLUNK(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e7f000000000000006173683d67686173682d636c6d756c6e69000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000"], 0x0, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140)=0x9, 0x4) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x108) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000002c0)=0xeb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x800000, 0x0) pselect6(0x40, &(0x7f0000000100)={0x800000002a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) time(&(0x7f00000000c0)) 02:39:59 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) 02:39:59 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:59 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'vcan0\x00', 0x3}, 0x18) 02:39:59 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000140007841dfffd946f610500022881001f03fe0504000800080001c00400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 289.430502][T14224] netlink: 'syz-executor.2': attribute type 6 has an invalid length. [ 290.178618][T14241] IPVS: ftp: loaded support on port[0] = 21 [ 290.246655][T14241] chnl_net:caif_netlink_parms(): no params data found [ 290.406815][T14241] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.414179][T14241] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.422599][T14241] device bridge_slave_0 entered promiscuous mode [ 290.499945][T14241] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.507030][T14241] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.515264][T14241] device bridge_slave_1 entered promiscuous mode [ 290.603547][T14241] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 290.615110][T14241] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 290.637819][T14241] team0: Port device team_slave_0 added [ 290.710996][T14241] team0: Port device team_slave_1 added [ 290.783044][T14241] device hsr_slave_0 entered promiscuous mode [ 290.820138][T14241] device hsr_slave_1 entered promiscuous mode [ 290.859844][T14241] debugfs: Directory 'hsr0' with parent '/' already present! [ 290.936923][T14241] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.944122][T14241] bridge0: port 2(bridge_slave_1) entered forwarding state [ 290.951598][T14241] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.958655][T14241] bridge0: port 1(bridge_slave_0) entered forwarding state [ 291.064736][T14241] 8021q: adding VLAN 0 to HW filter on device bond0 [ 291.077684][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 291.087109][ T9526] bridge0: port 1(bridge_slave_0) entered disabled state [ 291.095472][ T9526] bridge0: port 2(bridge_slave_1) entered disabled state [ 291.103853][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 291.185198][T14241] 8021q: adding VLAN 0 to HW filter on device team0 [ 291.195869][ T9487] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 291.204776][ T9487] bridge0: port 1(bridge_slave_0) entered blocking state [ 291.211877][ T9487] bridge0: port 1(bridge_slave_0) entered forwarding state [ 291.295758][T12888] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 291.306786][T12888] bridge0: port 2(bridge_slave_1) entered blocking state [ 291.313906][T12888] bridge0: port 2(bridge_slave_1) entered forwarding state [ 291.334310][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 291.343741][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 291.353975][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 291.362621][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 291.371578][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 291.380122][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 291.388495][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 291.397157][ T9526] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 291.477145][T14241] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 291.490187][T14241] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 291.498639][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 291.507606][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 291.550316][ T268] device hsr_slave_0 left promiscuous mode [ 291.590024][ T268] device hsr_slave_1 left promiscuous mode [ 291.629758][ C1] kasan: CONFIG_KASAN_INLINE enabled [ 291.635279][ C1] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 291.643445][ C1] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 291.650363][ C1] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 5.2.0+ #54 [ 291.657245][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.667377][ C1] RIP: 0010:send_hsr_supervision_frame+0x38/0xf20 [ 291.673778][ C1] Code: 89 fd 41 54 53 48 83 ec 50 89 75 bc e8 31 bc 4b fa 49 8d 45 10 48 89 c2 48 89 45 d0 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 dc 0c 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b [ 291.693525][ C1] RSP: 0018:ffff8880ae909c58 EFLAGS: 00010202 [ 291.699571][ C1] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff8726a287 [ 291.707529][ C1] RDX: 0000000000000002 RSI: ffffffff87268f3f RDI: 0000000000000000 [ 291.715512][ C1] RBP: ffff8880ae909cd0 R08: ffff8880a98ca340 R09: ffffed1015d26c84 [ 291.723465][ C1] R10: ffffed1015d26c83 R11: ffff8880ae93641b R12: ffff888096a315c0 [ 291.731418][ C1] R13: 0000000000000000 R14: 0000000000000000 R15: dffffc0000000000 [ 291.743257][ C1] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 291.752182][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 291.758748][ C1] CR2: 0000000000a75e58 CR3: 0000000091715000 CR4: 00000000001406e0 [ 291.766725][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 291.774770][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 291.782736][ C1] Call Trace: [ 291.786000][ C1] [ 291.788842][ C1] ? lock_acquire+0x190/0x410 [ 291.793505][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 291.799729][ C1] ? __kasan_check_read+0x11/0x20 [ 291.804792][ C1] hsr_announce+0x12f/0x3b0 [ 291.809280][ C1] call_timer_fn+0x1ac/0x780 [ 291.813867][ C1] ? hsr_dev_open+0x380/0x380 [ 291.818535][ C1] ? msleep_interruptible+0x150/0x150 [ 291.823889][ C1] ? run_timer_softirq+0x685/0x17a0 [ 291.829293][ C1] ? trace_hardirqs_on+0x67/0x240 [ 291.834303][ C1] ? __kasan_check_read+0x11/0x20 [ 291.839309][ C1] ? hsr_dev_open+0x380/0x380 [ 291.843966][ C1] ? hsr_dev_open+0x380/0x380 [ 291.848780][ C1] run_timer_softirq+0x697/0x17a0 [ 291.853799][ C1] ? add_timer+0x930/0x930 [ 291.858286][ C1] ? kvm_clock_read+0x18/0x30 [ 291.862949][ C1] ? sched_clock+0x2e/0x50 [ 291.867361][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 291.873602][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 291.879907][ C1] __do_softirq+0x262/0x98c [ 291.884395][ C1] ? sched_clock_cpu+0x1b/0x1b0 [ 291.889227][ C1] irq_exit+0x19b/0x1e0 [ 291.893377][ C1] smp_apic_timer_interrupt+0x1a3/0x610 [ 291.898905][ C1] apic_timer_interrupt+0xf/0x20 [ 291.903822][ C1] [ 291.906790][ C1] RIP: 0010:native_safe_halt+0xe/0x10 [ 291.912156][ C1] Code: a8 4d 7b fa eb 8a 90 90 90 90 90 90 e9 07 00 00 00 0f 00 2d 94 30 57 00 f4 c3 66 90 e9 07 00 00 00 0f 00 2d 84 30 57 00 fb f4 90 55 48 89 e5 41 57 41 56 41 55 41 54 53 e8 3e 49 2f fa e8 19 [ 291.931826][ C1] RSP: 0018:ffff8880a98dfd68 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 [ 291.940385][ C1] RAX: 1ffffffff11a5ca5 RBX: ffff8880a98ca340 RCX: 0000000000000000 [ 291.948341][ C1] RDX: dffffc0000000000 RSI: 0000000000000006 RDI: ffff8880a98cabcc [ 291.956301][ C1] RBP: ffff8880a98dfd98 R08: ffff8880a98ca340 R09: 0000000000000000 [ 291.964567][ C1] R10: 0000000000000000 R11: 0000000000000000 R12: dffffc0000000000 [ 291.972539][ C1] R13: ffffffff89a29278 R14: 0000000000000000 R15: 0000000000000001 [ 291.980789][ C1] ? default_idle+0x4e/0x360 [ 291.985365][ C1] arch_cpu_idle+0xa/0x10 [ 291.989683][ C1] default_idle_call+0x84/0xb0 [ 291.994530][ C1] do_idle+0x413/0x760 [ 291.998602][ C1] ? retint_kernel+0x2b/0x2b [ 292.003272][ C1] ? arch_cpu_idle_exit+0x80/0x80 [ 292.008285][ C1] ? do_idle+0x387/0x760 [ 292.012529][ C1] cpu_startup_entry+0x1b/0x20 [ 292.017648][ C1] start_secondary+0x315/0x430 [ 292.022394][ C1] ? set_cpu_sibling_map+0x2180/0x2180 [ 292.027835][ C1] secondary_startup_64+0xa4/0xb0 [ 292.032923][ C1] Modules linked in: [ 292.036855][ C1] ---[ end trace 1819f7be50b2f7e1 ]--- [ 292.042348][ C1] RIP: 0010:send_hsr_supervision_frame+0x38/0xf20 [ 292.048763][ C1] Code: 89 fd 41 54 53 48 83 ec 50 89 75 bc e8 31 bc 4b fa 49 8d 45 10 48 89 c2 48 89 45 d0 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 dc 0c 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b [ 292.068388][ C1] RSP: 0018:ffff8880ae909c58 EFLAGS: 00010202 [ 292.074559][ C1] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff8726a287 [ 292.082526][ C1] RDX: 0000000000000002 RSI: ffffffff87268f3f RDI: 0000000000000000 [ 292.090506][ C1] RBP: ffff8880ae909cd0 R08: ffff8880a98ca340 R09: ffffed1015d26c84 [ 292.098474][ C1] R10: ffffed1015d26c83 R11: ffff8880ae93641b R12: ffff888096a315c0 [ 292.106448][ C1] R13: 0000000000000000 R14: 0000000000000000 R15: dffffc0000000000 [ 292.114446][ C1] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 292.123387][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 292.129978][ C1] CR2: 0000000000a75e58 CR3: 0000000091715000 CR4: 00000000001406e0 [ 292.137944][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 292.146220][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 292.154233][ C1] Kernel panic - not syncing: Fatal exception in interrupt [ 292.162911][ C1] Kernel Offset: disabled [ 292.167231][ C1] Rebooting in 86400 seconds..